找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit

[復(fù)制鏈接]
查看: 28614|回復(fù): 56
樓主
發(fā)表于 2025-3-21 19:16:50 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱Cloud Computing and Security
副標(biāo)題4th International Co
編輯Xingming Sun,Zhaoqing Pan,Elisa Bertino
視頻videohttp://file.papertrans.cn/229/228425/228425.mp4
叢書(shū)名稱Lecture Notes in Computer Science
圖書(shū)封面Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit
描述This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.
出版日期Conference proceedings 2018
關(guān)鍵詞access control; artificial intelligence; authentication; data mining; data privacy; digital rights manage
版次1
doihttps://doi.org/10.1007/978-3-030-00012-7
isbn_softcover978-3-030-00011-0
isbn_ebook978-3-030-00012-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer Nature Switzerland AG 2018
The information of publication is updating

書(shū)目名稱Cloud Computing and Security影響因子(影響力)




書(shū)目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名




書(shū)目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Cloud Computing and Security被引頻次




書(shū)目名稱Cloud Computing and Security被引頻次學(xué)科排名




書(shū)目名稱Cloud Computing and Security年度引用




書(shū)目名稱Cloud Computing and Security年度引用學(xué)科排名




書(shū)目名稱Cloud Computing and Security讀者反饋




書(shū)目名稱Cloud Computing and Security讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:59:02 | 只看該作者
板凳
發(fā)表于 2025-3-22 04:24:06 | 只看該作者
Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System a drawback of the scheme is that only half of the quantum resource is effective, and the other half has to be discarded. To enhance the efficiency of the scheme, we propose an efficient multiparty QSS scheme and generalized it in high-dimensional system. By using a measurement-delay strategy on the
地板
發(fā)表于 2025-3-22 07:36:28 | 只看該作者
EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extensionr locations to get the service, which may cause the disclosure of their location privacy. In order to protect the location privacy, a typical way is to convert the specific location into a location area. After finding the interest points around the region, the server needs to refine the result set t
5#
發(fā)表于 2025-3-22 11:20:58 | 只看該作者
6#
發(fā)表于 2025-3-22 15:51:42 | 只看該作者
Focused Crawler Framework Based on Open Search Engineextract those match the users’ interests. However, in data acquisition stage, users usually have customize demand on acquiring data. Ordinary crawler systems are very resource-constrained so they cannot traverse the entire internet. Meanwhile, search engines can satisfy these demand but it relies on
7#
發(fā)表于 2025-3-22 17:02:50 | 只看該作者
Identity Based Privacy Information Sharing with Similarity Test in Cloud Environmentall, are used to prevent information from stealing. However, the above mentioned technologies severely hinder information sharing, especially in some special areas, such as medical industries in which doctors need to share similar patient’s information to improve the effectiveness of treatment. The
8#
發(fā)表于 2025-3-22 21:41:10 | 只看該作者
9#
發(fā)表于 2025-3-23 03:34:54 | 只看該作者
10#
發(fā)表于 2025-3-23 06:11:54 | 只看該作者
Mass Discovery of Android Malware Behavioral Characteristics for Detection Considerationeir behavioral characteristics at a large scale, and use them to detect Android malware. In this work, we are motivated to discover the discriminatory features extracted from Android APK files for Android malware detection. To achieve this goal, firstly we extract a very large number of static featu
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-10 07:30
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
元谋县| 绥滨县| 庆城县| 遂宁市| 富源县| 靖西县| 武陟县| 上蔡县| 和静县| 巨鹿县| 宝坻区| 茂名市| 昌吉市| 常熟市| 商水县| 上林县| 东方市| 和静县| 昌吉市| 韩城市| 读书| 榆树市| 合肥市| 敦化市| 新兴县| 卢湾区| 景谷| 惠东县| 安庆市| 佛坪县| 上杭县| 鄯善县| 龙川县| 泗阳县| 弥渡县| 镇安县| 乌拉特前旗| 荃湾区| 甘肃省| 章丘市| 珲春市|