Cloud Computing and Security 1st edition by Zhiqiu Huang – Ebook PDF Instant Download/Delivery: 9783319685427, 3319685422
Full dowload Cloud Computing and Security 1st edition after payment
Product details:
• ISBN 10:3319685422
• ISBN 13:9783319685427
• Author:Zhiqiu Huang
Cloud Computing and Security
Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers and 11 short papers of these volumes were carefully reviewed and selected from 391 submissions. The papers are organized in topical sections such as: information hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.
Cloud Computing and Security 1st Table of contents:
1. Information Security
Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud
Probability-p Order-Preserving Encryption
DLPDS: Learning Users’ Information Sharing Behaviors for Privacy Default Setting in Recommender System
New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with Optimal Partial Hamming Correlation
Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks
Bayesian Game Based Pseudo Honeypot Model in Social Networks
Conducting Correlated Laplace Mechanism for Differential Privacy
A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security
Quantum Secret Sharing in Noisy Environment
SimHash-Based Similar Neighbor Finding for Scalable and Privacy-Preserving Service Recommendation
Universally Composable Three-Party Password Authenticated Key Exchange
A High-Capacity Quantum Secret Sharing Protocol Based on Single D-Level Particles
An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver
Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling
A Mutation Approach of Detecting SQL Injection Vulnerabilities
A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing
An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network
Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems
An Enhanced Method of Trajectory Privacy Preservation Through Trajectory Reconstruction
Efficient and Short Identity-Based Deniable Authenticated Encryption
Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme
Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud
Detect Storage Vulnerability of User-Input Privacy in Android Applications with Static and Dynamic Analysis
Certificateless Cryptography with KGC Trust Level 3 Revisited
Server-Less Lightweight Authentication Protocol for RFID System
Efficient CP-ABE with Non-monotonic Access Structures
Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding Technique
On-Line Intrusion Detection Model Based on Approximate Linear Dependent Condition with Linear Latent Feature Extraction
Differential Direction Adaptive Based Reversible Information Hiding
Detection of Jitterbug Covert Channel Based on Partial Entropy Test
2. Multimedia Applications
Frame-Deletion Detection for Static-Background Video Based on Multi-scale Mutual Information
Learning Based Fast H.264/AVC to HEVC INTRA Video Transcoding for Cloud Media Computing
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression
Spatial-Temporal Correlation Based Multi-resolution Hybrid Motion Estimation for Frame Rate Up-Conversion
A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix
Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold
Kernel Searching Strategy for Recommender Searching Mechanism
A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar Images
Adaptive Hybrid Wavelet Regularization Method for Compressive Imaging
Registration of OCT Fundus Images with Color Fundus Images Based on Invariant Features
View-Based 3D Model Retrieval Based on Distance Learning
PCANet for Color Image Classification in Various Color Spaces
A Method of Group Behavior Analysis for Enhanced Affinity Propagation
A Median Filtering Forensics Approach Based on Machine Learning
Spatiotemporal Radio Tomographic Imaging with Bayesian Compressive Sensing for RSS-Based Indoor Target Localization
Detection in SAR Images Based on Histogram and Improved Elitist Genetic Fuzzy Clustering
Research on Cognitive Radio Spectrum Sensing Method Based on Information Geometry
Android Malware Detection Using Hybrid Analysis and Machine Learning Technique
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems
Biclustering Evolutionary Spatiotemporal Community in Global Trading Network
3. Optimization and Classification
Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed Datacenters
The Application of Naive Bayes Classifier in Name Disambiguation
Mobility Prediction-Based Service Scheduling Optimization Algorithm in Cloudlets
Single Appliance Recognition Using Statistical Features Based k-NN Classification
Performance Measurement and Configuration Optimization of Virtual Machines Based on the Bayesian Network
Image Recapture Detection Through Residual-Based Local Descriptors and Machine Learning
A Method Towards Community Detection Based on Estimation of Distribution Algorithm
Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian Process
HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable Computing
An Improved Quantum-Inspired Evolutionary Algorithm for Knapsack Problems
Output-Based Sampled Data Control for Linear Systems: A Measurement Error Estimation Approach
Adaptive Firefly Algorithm with a Modified Attractiveness Strategy
Newton Method for Interval Predictor Model with Sphere Parameter Set
A Conjugate Gradient Algorithm with Yuan-Wei-Lu Line Search
IU-PMF: Probabilistic Matrix Factorization Model Fused with Item Similarity and User Similarity
New Delay-Dependent Stability for Neutral Systems with Its Application to Partial Circuit Model
A Quantitative Evaluation Method of Surveillance Coverage of UAVs Swarm
Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector Machines
4. Short Paper
System Log-Based Android Root State Detection
Quantified Attribute Access Control Model for Cloud Storage Platform
Dynamically-Enabled Defense Effectiveness Evaluation in Home Internet Based on Vulnerability Analysis
The Formal Transformation of AADL Based on Z-CoIA
Masking Signature Data Errors of Software-Based Control Flow Checking Techniques Employing Redundancy Signature
The Analysis of Key Nodes in Complex Social Networks
Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography
An Improved RFID Search Protocol
A Developmental Evolutionary Algorithm for 0-1 Knapsack Problem
WiSmart : Robust Human Access and Identification for Smart Homes Using WiFi Signals
Robust Face Recognition Model with Adaptive Correction Term via Generalized Alternating Direction Method of Multipliers
Backmatter
People also search for Cloud Computing and Security 1st:
cloud computing and security
sec388 introduction to cloud computing and security
introduction to cloud computing and security
examples of cloud computing and security
describe cloud computing and security
Reviews
There are no reviews yet.