Advertisement

Cloud Computing and Security

4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III

  • Xingming Sun
  • Zhaoqing Pan
  • Elisa Bertino
Conference proceedings ICCCS 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11065)

Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNISA, volume 11065)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. Cloud Security

    1. Front Matter
      Pages 1-1
    2. Yongjun Ren, Yepeng Liu, Chengshan Qian
      Pages 3-11
    3. Lixia Xie, Ruixin Wei, Yuguang Ning, Hongyu Yang
      Pages 12-22
    4. Ming-Ming Wang, Lu-Ting Tian, Zhi-Guo Qu
      Pages 23-31
    5. Honghao Zhou, Tinghuai Ma, Jing Jia, Yuan Tian, Mznah Al-Rodhaan
      Pages 32-43
    6. Zhiliang Wang, Changping Zhou, Yang Yu, Xingang Shi, Xia Yin, Jiangyuan Yao
      Pages 44-55
    7. Jiawei Liu, Yongfeng Huang
      Pages 56-68
    8. Faguo Wu, Wang Yao, Xiao Zhang, Zhiming Zheng, Wenhua Wang
      Pages 69-78
    9. Xintao Duan, Jingjing Liu, En Zhang, Haoxian Song, Kai Jia
      Pages 79-89
    10. Jian Song, Bo-ru Xu, Guo-chao Zhang, Guang-song Li, Chuan-gui Ma, Ai-jun Ge
      Pages 90-100
    11. Lijuan Zheng, Linhao Zhang, Meng Cui, Jianyou Chen, Shaobo Yang, Zhaoxuan Li
      Pages 113-122
    12. Yang Xu, Ziwang Wang, Lei Huang, Xiaoyao Xie
      Pages 123-137
    13. Shuai Zhang, Zhiwei Gao, Li Cui
      Pages 138-150
    14. Junshe Wang, Yuzi Yi, Hongbin Zhang, Ning Cao
      Pages 151-160
    15. Jianyi Liu, Fangyu Weng, Ru Zhang, Yunbiao Guo
      Pages 161-173
    16. Jilin Wang, Yingzi Chen, Xiaoqing Feng
      Pages 195-205
    17. Xiaotong Wu, Pingzeng Liu, Jianrui Ding, Changqing Song, Bangguo Li, Xueru Yu
      Pages 217-226
    18. Xiaolan Xie, Xiao Zhou, Tianwei Yuan
      Pages 234-244
    19. Xinfeng Zhu, Zhihao Zhang, Yanling Wang, Guohai Wang
      Pages 245-252
    20. Zhongliang Yang, Pengyu Zhang, Minyu Jiang, Yongfeng Huang, Yu-Jin Zhang
      Pages 253-264
    21. Li Ximing, Chen Weizhao, Guo Yubin, Zhang Senyang, Huang Qiong
      Pages 277-289
    22. Ge Suhui, Wan Quan, Sun Wenhui
      Pages 290-297
    23. Linghao Zhang, Sheng Wang, Wei Gan, Chao Tang, Jie Zhang, Huihui Liang
      Pages 298-309
    24. Yazhou Dong, Mengxing Huang, Di Wu, Xijun He, Zhaoqing Wang, Uzair Aslam Bhatti
      Pages 310-321
    25. Erxue Min, Jun Long, Qiang Liu, Jianjing Cui, Zhiping Cai, Junbo Ma
      Pages 322-334
    26. Chunhua Li, Jiaqi Hu, Ke Zhou, Yuanzhang Wang, Hongyu Deng
      Pages 335-345
  3. Encryption

    1. Front Matter
      Pages 347-347
    2. Qian Yin, Gang Luo
      Pages 383-392
    3. Juanmei Zhang, Zichen Li, Yafei Sun, Boya Liu, Yatao Yang
      Pages 393-402
    4. Qing Ye, Mingxing Hu, Wei Gao, Yongli Tang
      Pages 412-422
    5. Mingxing Hu, Qing Ye, Wei Gao, Yongli Tang
      Pages 423-434
    6. Yun Tan, Jiaohua Qin, Ling Tan, Hao Tang, Xuyu Xiang
      Pages 458-467
    7. Hong Lai, Mingxing Luo, Li Tao, Fuyuan Xiao, Cheng Zhan, Xiaofang Hu
      Pages 479-489
    8. Jinxia Yu, Chaochao Yang, Yongli Tang, Xixi Yan
      Pages 519-527

Other volumes

  1. 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II
  2. Cloud Computing and Security
    4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III
  3. 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV

About these proceedings

Introduction

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.

Keywords

access control artificial intelligence authentication data mining data privacy digital rights management digital watermarking document management and text encryption image processing, internet communications tools mobile and wireless security multimedia and multimodal retrieval multimedia information systems network security public key cryptography theory of database rivacy and security virtualization and security Web application security web protocol security

Editors and affiliations

  1. 1.Nanjing University of Information Science and TechnologyNanjingChina
  2. 2.Nanjing University of Information Science and TechnologyNanjingChina
  3. 3.Department of Computer SciencePurdue UniversityWest LafayetteUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-00012-7
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-00011-0
  • Online ISBN 978-3-030-00012-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Engineering