Cloud Computing and Security

4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III

Nonfiction, Computers, Advanced Computing, Information Technology, Networking & Communications, Computer Security, General Computing
Cover of the book Cloud Computing and Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030000127
Publisher: Springer International Publishing Publication: September 12, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783030000127
Publisher: Springer International Publishing
Publication: September 12, 2018
Imprint: Springer
Language: English

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

More books from Springer International Publishing

Cover of the book Famine and Finance by
Cover of the book Cybersecurity Investments by
Cover of the book A Law of Blood-ties - The 'Right' to Access Genetic Ancestry by
Cover of the book The Floating Strip Micromegas Detector by
Cover of the book On-Chip Electro-Static Discharge (ESD) Protection for Radio-Frequency Integrated Circuits by
Cover of the book Introduction to Geospatial Information and Communication Technology (GeoICT) by
Cover of the book Schizoanalytic Ventures at the End of the World by
Cover of the book Socio-technical Design of Ubiquitous Computing Systems by
Cover of the book Meta-Philosophical Reflection on Feminist Philosophies of Science by
Cover of the book Children's Rights and Social Work by
Cover of the book The Legal Regime Applicable to Private Military and Security Company Personnel in Armed Conflicts by
Cover of the book Business and Society in the Middle East by
Cover of the book Mental Health Uncertainty and Inevitability by
Cover of the book Design for Experience by
Cover of the book Globalization and Africa’s Transition to Constitutional Rule by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy