Cloud Computing and Security Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II / [electronic resource] :
edited by Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino.
- 1st ed. 2016.
- XX, 636 p. 261 illus. online resource.
- Information Systems and Applications, incl. Internet/Web, and HCI, 10040 2946-1642 ; .
- Information Systems and Applications, incl. Internet/Web, and HCI, 10040 .
Information Hiding -- Cloud Computing -- Cloud Security -- IOT Applications -- Multimedia Applications -- Multimedia Security and Forensics.
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
9783319486741
10.1007/978-3-319-48674-1 doi
Application software.
Computer networks .
Algorithms.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer and Information Systems Applications.
Computer Communication Networks.
Algorithms.
Cryptology.
Computers and Society.
QA76.76.A65
005.3
Information Hiding -- Cloud Computing -- Cloud Security -- IOT Applications -- Multimedia Applications -- Multimedia Security and Forensics.
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
9783319486741
10.1007/978-3-319-48674-1 doi
Application software.
Computer networks .
Algorithms.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer and Information Systems Applications.
Computer Communication Networks.
Algorithms.
Cryptology.
Computers and Society.
QA76.76.A65
005.3