找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit

[復(fù)制鏈接]
查看: 36730|回復(fù): 58
樓主
發(fā)表于 2025-3-21 19:30:20 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱(chēng)Cloud Computing and Security
副標(biāo)題4th International Co
編輯Xingming Sun,Zhaoqing Pan,Elisa Bertino
視頻videohttp://file.papertrans.cn/229/228430/228430.mp4
叢書(shū)名稱(chēng)Lecture Notes in Computer Science
圖書(shū)封面Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit
描述This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics
出版日期Conference proceedings 2018
關(guān)鍵詞access control; artificial intelligence; cloud computing; cryptography; data security; digital rights man
版次1
doihttps://doi.org/10.1007/978-3-030-00015-8
isbn_softcover978-3-030-00014-1
isbn_ebook978-3-030-00015-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer Nature Switzerland AG 2018
The information of publication is updating

書(shū)目名稱(chēng)Cloud Computing and Security影響因子(影響力)




書(shū)目名稱(chēng)Cloud Computing and Security影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Cloud Computing and Security被引頻次




書(shū)目名稱(chēng)Cloud Computing and Security被引頻次學(xué)科排名




書(shū)目名稱(chēng)Cloud Computing and Security年度引用




書(shū)目名稱(chēng)Cloud Computing and Security年度引用學(xué)科排名




書(shū)目名稱(chēng)Cloud Computing and Security讀者反饋




書(shū)目名稱(chēng)Cloud Computing and Security讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶(hù)組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-22 00:03:24 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:19:21 | 只看該作者
https://doi.org/10.1007/978-3-642-99726-6 a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.
地板
發(fā)表于 2025-3-22 07:12:40 | 只看該作者
https://doi.org/10.1007/978-3-642-51986-4 extracting procedures are implemented via these basic interactions, in which texts, pictures, voices or videos are used as carriers. With the features of language diversification, common media, real-time in an instant message communication, the proposed steganography in this paper is flexible, secure and reliable.
5#
發(fā)表于 2025-3-22 10:30:14 | 只看該作者
6#
發(fā)表于 2025-3-22 14:57:59 | 只看該作者
Threshold Proxy Re-encryption and Its Application in Blockchainoved secure by using the intractability of discrete logarithms. This paper presents a consortium blockchain access permission scheme, which is built on the threshold proxy re-encryption scheme. When a new node joins a consortium blockchain, an access permission is achieved by the agreement on other existing nodes, instead of a centralized CA.
7#
發(fā)表于 2025-3-22 19:43:59 | 只看該作者
A Data Hiding Scheme with High Quality for H.264/AVC Video Streams a few degradations in terms of visual quality and keep a small variation in bit-rate increase. Experimental results have verified that the proposed method has no significant degradation in terms of visual quality (i.e., PSNR and SSIM) and indeed obtains a very small variation in bit-rate increase.
8#
發(fā)表于 2025-3-23 00:59:01 | 只看該作者
9#
發(fā)表于 2025-3-23 03:11:25 | 只看該作者
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hidifixed parameters predictors through simple arithmetic combination of its surroundings pixel, experimental results show that the proposed method can provide a sparser prediction-error image for data embedding, and thus improves the performance of RDH more effectively than those state-of-the-art error prediction algorithms.
10#
發(fā)表于 2025-3-23 06:38:09 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 08:43
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
玉山县| 益阳市| 秦安县| 麦盖提县| 榆中县| 宁都县| 乐昌市| 凤庆县| 凤城市| 潮安县| 泉州市| 湘潭县| 淅川县| 林州市| 横峰县| 中超| 贵州省| 宁陕县| 华容县| 博客| 巴东县| 开鲁县| 宜州市| 库伦旗| 谷城县| 阿图什市| 荣成市| 岳普湖县| 昆山市| 金溪县| 长乐市| 上思县| 时尚| 西宁市| 军事| 鄯善县| 商洛市| 绍兴市| 库车县| 白城市| 临安市|