LEADER 00839nam0-22003011i-450- 001 990000671780403321 005 20090318105453.0 035 $a000067178 035 $aFED01000067178 035 $a(Aleph)000067178FED01 035 $a000067178 100 $a20020821d1988----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aVideoscrittura 4$eguida all'uso$fDavid D. Busch 210 $aMilano$cGruppo editoriale Jackson$dstampa 1988 215 $aXV, 403 p.$cill.$d24 cm 300 $aSul dorso : 748 700 1$aBusch,$bDavid D.$0143837 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000671780403321 952 $a01 C III 50$b1175$fDINST 952 $a10 P.T. 91$b800 D.E.E.$fDINEL 959 $aDINST 959 $aDINEL 996 $aVideoscrittura 4$9326474 997 $aUNINA LEADER 05530nam 22007695 450 001 9910299289503321 005 20251225200527.0 010 $a3-319-69605-X 024 7 $a10.1007/978-3-319-69605-8 035 $a(CKB)4340000000223498 035 $a(DE-He213)978-3-319-69605-8 035 $a(MiAaPQ)EBC5589231 035 $a(PPN)221252622 035 $a(EXLCZ)994340000000223498 100 $a20171111d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCloud Computing, Security, Privacy in New Computing Environments $e7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25?26, and December 15?16, 2016, Proceedings /$fedited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIV, 240 p. 61 illus.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v197 311 08$a3-319-69604-1 327 $aSoftware Defined Network Routing in Wireless Sensor Network -- Efficient Graph Mining on Heterogeneous Platforms in the Cloud -- Correlation-Aware Virtual Machine Placement in Data Center Networks -- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center -- Ethical Trust in Cloud Computing Using Fuzzy Logic -- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users -- Mobile Cloud Platform: Architecture Deployment and Big Data Applications -- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM -- Question Recommendation Based on User Model in CQA -- Data Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption for Character Data -- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System -- Ring Signature Scheme from Multilinear Maps in the Standard Model -- A Revocable Outsourcing Attribute-based Encryption Scheme -- Operational-behavior Auditing in Cloud Storage.-Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud -- Secure Searchable Public-Key Encryption for Cloud Storage -- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images -- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks -- DMSD-FPE: Data masking system for database based on format-preserving encryption -- Delay-tolerant Network Based Secure Transmission System Design -- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV.  . 330 $aThis book constitutes the refereed proceedings of the 7th International Conference on Cloud Computing, Security, Privacy in New Computing Environments, CloudComp 2016, and the First EAI International Conference SPNCE 2016, both held in Guangzhou, China, in November and December 2016. The proceedings contain 10 full papers selected from 27 submissions and presented at CloudComp 2016 and 12 full papers selected from 69 submissions and presented at SPNCE 2016. CloudComp 2016 presents recent advances and experiences in clouds, cloud computing and related ecosystems and business support. SPNCE 2016 focuses on security and privacy aspects of new computing environments including mobile computing, big data, cloud computing and other large-scale environments. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v197 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aData and Information Security 606 $aCryptology 606 $aArtificial Intelligence 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aArtificial intelligence. 615 14$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aData and Information Security. 615 24$aCryptology. 615 24$aArtificial Intelligence. 676 $a004.6782 702 $aWan$b Jiafu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLin$b Kai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZeng$b Delu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Jin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXiang$b Yang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiao$b Xiaofeng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHuang$b Jiwu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiu$b Zheli$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299289503321 996 $aCloud Computing, Security, Privacy in New Computing Environments$92274737 997 $aUNINA