找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit

[復(fù)制鏈接]
查看: 28609|回復(fù): 56
樓主
發(fā)表于 2025-3-21 19:16:50 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Cloud Computing and Security
副標(biāo)題4th International Co
編輯Xingming Sun,Zhaoqing Pan,Elisa Bertino
視頻videohttp://file.papertrans.cn/229/228425/228425.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit
描述This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.
出版日期Conference proceedings 2018
關(guān)鍵詞access control; artificial intelligence; authentication; data mining; data privacy; digital rights manage
版次1
doihttps://doi.org/10.1007/978-3-030-00012-7
isbn_softcover978-3-030-00011-0
isbn_ebook978-3-030-00012-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer Nature Switzerland AG 2018
The information of publication is updating

書目名稱Cloud Computing and Security影響因子(影響力)




書目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名




書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度




書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cloud Computing and Security被引頻次




書目名稱Cloud Computing and Security被引頻次學(xué)科排名




書目名稱Cloud Computing and Security年度引用




書目名稱Cloud Computing and Security年度引用學(xué)科排名




書目名稱Cloud Computing and Security讀者反饋




書目名稱Cloud Computing and Security讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:59:02 | 只看該作者
板凳
發(fā)表于 2025-3-22 04:24:06 | 只看該作者
Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System a drawback of the scheme is that only half of the quantum resource is effective, and the other half has to be discarded. To enhance the efficiency of the scheme, we propose an efficient multiparty QSS scheme and generalized it in high-dimensional system. By using a measurement-delay strategy on the
地板
發(fā)表于 2025-3-22 07:36:28 | 只看該作者
EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extensionr locations to get the service, which may cause the disclosure of their location privacy. In order to protect the location privacy, a typical way is to convert the specific location into a location area. After finding the interest points around the region, the server needs to refine the result set t
5#
發(fā)表于 2025-3-22 11:20:58 | 只看該作者
6#
發(fā)表于 2025-3-22 15:51:42 | 只看該作者
Focused Crawler Framework Based on Open Search Engineextract those match the users’ interests. However, in data acquisition stage, users usually have customize demand on acquiring data. Ordinary crawler systems are very resource-constrained so they cannot traverse the entire internet. Meanwhile, search engines can satisfy these demand but it relies on
7#
發(fā)表于 2025-3-22 17:02:50 | 只看該作者
Identity Based Privacy Information Sharing with Similarity Test in Cloud Environmentall, are used to prevent information from stealing. However, the above mentioned technologies severely hinder information sharing, especially in some special areas, such as medical industries in which doctors need to share similar patient’s information to improve the effectiveness of treatment. The
8#
發(fā)表于 2025-3-22 21:41:10 | 只看該作者
9#
發(fā)表于 2025-3-23 03:34:54 | 只看該作者
10#
發(fā)表于 2025-3-23 06:11:54 | 只看該作者
Mass Discovery of Android Malware Behavioral Characteristics for Detection Considerationeir behavioral characteristics at a large scale, and use them to detect Android malware. In this work, we are motivated to discover the discriminatory features extracted from Android APK files for Android malware detection. To achieve this goal, firstly we extract a very large number of static featu
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 23:33
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
凤阳县| 峨山| 白沙| 西畴县| 军事| 志丹县| 丰城市| 民和| 鄢陵县| 二手房| 岱山县| 阳山县| 中西区| 迁西县| 交口县| 弋阳县| 通城县| 阳江市| 巴南区| 堆龙德庆县| 太白县| 平顶山市| 滨州市| 丰都县| 双峰县| 惠安县| 甘肃省| 龙江县| 珠海市| 拜城县| 青铜峡市| 吐鲁番市| 长沙县| 和田市| 寻甸| 德江县| 曲靖市| 侯马市| 武威市| 鸡泽县| 鹰潭市|