LEADER 04218nam 22008175 450 001 996466471503316 005 20200828214903.0 010 $a3-319-68542-2 024 7 $a10.1007/978-3-319-68542-7 035 $a(CKB)4340000000223455 035 $a(DE-He213)978-3-319-68542-7 035 $a(MiAaPQ)EBC6298555 035 $a(MiAaPQ)EBC5578792 035 $a(Au-PeEL)EBL5578792 035 $a(OCoLC)1011591566 035 $a(PPN)221251308 035 $a(EXLCZ)994340000000223455 100 $a20171101d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCloud Computing and Security$b[electronic resource] $eThird International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II /$fedited by Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XXII, 879 p. 281 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v10603 300 $aIncludes index. 311 $a3-319-68541-4 327 $aInformation hiding -- Cloud computing.- IOT applications --  Information security -- Multimedia applications.-Optimization  and classification. 330 $aThis two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017. The 116 full papers and 11 short papers of these volumes were carefully  reviewed and selected from 391 submissions. The papers are organized in  topical sections such as: information hiding; cloud computing;  IOT applications; information security; multimedia applications; optimization  and classification. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v10603 606 $aApplication software 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aApplication software. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aComputers and Society. 676 $a004 702 $aSun$b Xingming$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChao$b Han-Chieh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYou$b Xingang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBertino$b Elisa$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466471503316 996 $aCloud Computing and Security$91934692 997 $aUNISA