Security with Intelligent Computing and Big-data Services

  • Sheng-Lung Peng
  • Shiuh-Jeng Wang
  • Valentina Emilia Balas
  • Ming Zhao
Conference proceedings SICBS 2017

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 733)

Table of contents

  1. Front Matter
    Pages i-xvi
  2. Algorithms and Security Analysis

    1. Front Matter
      Pages 1-1
    2. Li Li, Yanyun Li, Bing Wang, Jianfeng Lu, Shanqing Zhang, Wenqiang Yuan et al.
      Pages 20-32
    3. Ming Zhao, Jeng-Shyang Pan, Shuo-Tsung Chen
      Pages 33-43
  3. Cryptanalysis and Detection Systems

    1. Front Matter
      Pages 45-45
    2. Jheng-Mo Liao, Jui-Sheng Liu, Sheng-De Wang
      Pages 57-69
    3. Tai-Siang Huang, Po-Yang Hsiung, Bo-Chao Cheng
      Pages 70-78
    4. Yi-Chih Kao, Yuan-Ping Hwang, Shih-Chen Wang, Sheng-Lung Peng
      Pages 79-85
    5. Jianjun Li, Juxian Wang, Chin-Chen Chang, Zhuo Tang, Zhenxing Luo
      Pages 86-97
  4. IoT and E-commerce Applications

    1. Front Matter
      Pages 113-113
    2. Sabah Al-Fedaghi, Omar Alsumait
      Pages 115-125
    3. Daeil Jang, Taeeun Kim, Hwankuk Kim
      Pages 138-145
  5. Privacy and Cloud Computing

    1. Front Matter
      Pages 147-147

About these proceedings


In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications. The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.


Information Hiding and Cryptography Information Security Information Processing Genetic Computing Evolutionary Computing Intelligent Computing Grid Computing Intelligent System Big Data and Technological Computing Internet of Things and Pervasive Computing

Editors and affiliations

  • Sheng-Lung Peng
    • 1
  • Shiuh-Jeng Wang
    • 2
  • Valentina Emilia Balas
    • 3
  • Ming Zhao
    • 4
  1. 1.Department of Computer Science and Information EngineeringNational Dong Hwa UniversityHualienTaiwan
  2. 2.Department of Information ManagementCentral Police UniversityTaoyuanTaiwan
  3. 3.Department of Automation and Applied Informatics, Faculty of EngineeringAurel Vlaicu University of AradAradRomania
  4. 4.School of Computer TechnologyJingzhouChina

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-76450-4
  • Online ISBN 978-3-319-76451-1
  • Series Print ISSN 2194-5357
  • Series Online ISSN 2194-5365
  • About this book
Industry Sectors
Chemical Manufacturing
Energy, Utilities & Environment
Oil, Gas & Geosciences