Amazon cover image
Image from Amazon.com

Cloud computing and security : second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers. Part II / edited by Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino.

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 10040.Publisher: Cham, Switzerland : Springer, 2016Description: 1 online resource (xx, 636 pages) : 261 illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319486741
  • 3319486748
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.7 23
LOC classification:
  • QA76.76.A65 I33 2016
Online resources:
Contents:
Information Hiding -- Cloud Computing -- Cloud Security -- IOT Applications -- Multimedia Applications -- Multimedia Security and Forensics.
Summary: This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Information Hiding -- Cloud Computing -- Cloud Security -- IOT Applications -- Multimedia Applications -- Multimedia Security and Forensics.

This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.

Online resource; title from digital title page (viewed on July 04, 2019).

Powered by Koha