Advertisement

Cloud Computing and Security

4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V

  • Xingming Sun
  • Zhaoqing Pan
  • Elisa Bertino
Conference proceedings ICCCS 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11067)

Also part of the Information Systems and Applications, incl. Internet/Web, and HCI book sub series (LNISA, volume 11067)

Table of contents

  1. Front Matter
    Pages I-XVIII
  2. IOT Security

    1. Front Matter
      Pages 1-1
    2. Cui Zhao, Han Ding, Kaiyan Cui, Fan Liang
      Pages 16-26
    3. Yanhan Yang, Yaming Yang, Jinlian Chen, Mingzhe Liu
      Pages 73-82
    4. Gongbo Wang, Weiyu Dong, Rui Chang
      Pages 94-105
    5. Dong-Fen Li, Rui-Jin Wang, Daniel Adu-Gyamfi, Jin-lian Chen, Ya-Ming Yang, Ming-Zhe Liu
      Pages 106-117
    6. Shengqian Ma, Fanchen Meng, Yanruixuan Ma, Jisong Su
      Pages 118-127
    7. Suying Li, Zhenzhou Ma, Peitao Han, Siyang Zhao, Peiying Guo, Hepeng Dai
      Pages 128-137
    8. Shanliang Xue, Mengying Li, Peiru Yang
      Pages 138-147
    9. Jianjing Cui, Jun Long, Erxue Min, Qiang Liu, Qian Li
      Pages 159-170
    10. Yajie Sun, Yanqing Yuan, Lihua Wang
      Pages 171-179
    11. Wenting Jiang, Yan Chen, Yingqian Liao
      Pages 180-190
    12. Min Cui, Fengtong Mei, Qiangyi Li, Qiangnan Li
      Pages 191-204
    13. Sunil Kr. Jha, Parimala Paramasivam, Zhaoqing Pan, Jinwei Wang
      Pages 205-216
    14. Tianyou Chang, Qiang Wei, Wenwen Liu, Yangyang Geng
      Pages 241-255
    15. Xiaopeng Li, Fei Xiao, Ling Li, Jiangjiang Shen, Fengchen Qian
      Pages 256-265
    16. Ning Liu, Min Yang, Hang Zhang, Chen Yang, Yang Zhao, Jianchao Gan et al.
      Pages 266-275
    17. Yue Fu, Rong Du, Dagang Li
      Pages 276-285
    18. Lingren Wang, Jingbing Li, Jieren Cheng, Uzair Aslam Bhatti, Qianning Dai
      Pages 286-297
    19. Chunru Zhou, Min Lei, Kunchang Li, Li Xu, Wei Bi
      Pages 298-307
    20. Xiawei Jiang, Weidong Yi, Yongrui Chen, Hao He
      Pages 308-319
    21. Zhiqiang Ruan, Haibo Luo, Wenzhong Lin
      Pages 320-330
    22. Jianyong Zhang, Pingzeng Liu, Wang Xue, Zhao Rui
      Pages 331-343
    23. Wenzao Li, Bing Wan, Zhan Wen, Jianwei Liu, Yue Cao, Tao Wu et al.
      Pages 344-355
    24. YuQun, Zhang Yan, Wang Xiu-li, Li Bao-quan
      Pages 407-417
    25. Lei Wang, Kunqin Li, Xianxiang Chen
      Pages 418-428
    26. Hangyu Hu, Xuemeng Zhai, Mingda Wang, Guangmin Hu
      Pages 429-439
    27. Shaojun Yan, Haihua Liang, Xinpeng Zhang
      Pages 440-452
    28. Shiyuan Zhang, Hui He, Zhi Wang, Mingze Gao, Jinsong Mao
      Pages 453-464
    29. Hongyi Chen, Jinshu Su, Linbo Qiao, Yi Zhang, Qin Xin
      Pages 465-477
    30. Xueli Hu, Qi Xi, Zhenxing Wang
      Pages 491-503
    31. Shirui Huang, Hengwei Zhang, Jindong Wang, Jianming Huang
      Pages 504-516
    32. Zhouwen Tan, Hongli Liu, Ziji Ma, Yun Cheng
      Pages 517-527

Other volumes

  1. 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I
  2. 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II
  3. 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part III
  4. 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IV
  5. Cloud Computing and Security
    4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V
  6. 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI

About these proceedings

Introduction

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics

Keywords

artificial intelligence authentication computer networks cryptography data mining data security internet Internet of Things (IoT) network security radio sensor networks sensors signal processing telecommunication networks ubiquitous computing user interfaces wireless wireless networks wireless sensor networks wireless telecommunication systems

Editors and affiliations

  1. 1.Nanjing University of Information Science and TechnologyNanjingChina
  2. 2.Nanjing University of Information Science and TechnologyNanjingChina
  3. 3.Department of Computer SciencePurdue UniversityWest LafayetteUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-00018-9
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-00017-2
  • Online ISBN 978-3-030-00018-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law