دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino (eds.) سری: Information Systems and Applications, incl. Internet/Web, and HCI 10603 ISBN (شابک) : 9783319685410, 9783319685427 ناشر: Springer International Publishing سال نشر: 2017 تعداد صفحات: 895 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 57 مگابایت
کلمات کلیدی مربوط به کتاب ابر رایانه و امنیت: سومین کنفرانس بین المللی، ICCCS 2017، نانجینگ، چین، 16-18 ژوئن 2017، مقالات منتخب تجدید نظر، قسمت دوم: برنامه های کاربردی سیستم های اطلاعاتی (شامل اینترنت)
در صورت تبدیل فایل کتاب Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ابر رایانه و امنیت: سومین کنفرانس بین المللی، ICCCS 2017، نانجینگ، چین، 16-18 ژوئن 2017، مقالات منتخب تجدید نظر، قسمت دوم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این مجموعه دو جلدی LNCS 10602 و LNCS 10603 مجموعه مقالات پس از کنفرانس با داوری کامل سومین کنفرانس بین المللی رایانش ابری و امنیت، ICCCS 2017، که در نانجینگ، چین، در ژوئن 2017 برگزار شد، را تشکیل می دهد.
>116 مقاله کامل و 11 مقاله کوتاه از این مجلدها به دقت بررسی و از بین 391 مقاله ارسالی انتخاب شدند. مقالات در بخش های موضوعی مانند: پنهان کردن اطلاعات سازماندهی شده اند. پردازش ابری؛ برنامه های کاربردی IOT؛ امنیت اطلاعات؛ برنامه های چند رسانه ای؛ بهینه سازی و طبقه بندی.
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.
The 116 full papers and 11 short papers of these volumes were carefully reviewed and selected from 391 submissions. The papers are organized in topical sections such as: information hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.
Front Matter ....Pages I-XXII
Front Matter ....Pages 1-1
Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud (Shaojing Fu, Yunpeng Yu, Ming Xu)....Pages 3-15
Probability-p Order-Preserving Encryption (Ce Yang, Weiming Zhang, Jiachen Ding, Nenghai Yu)....Pages 16-28
DLPDS: Learning Users’ Information Sharing Behaviors for Privacy Default Setting in Recommender System (Hongchen Wu, Huaxiang Zhang)....Pages 29-39
New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with Optimal Partial Hamming Correlation (Zhengqian Li, Pinhui Ke, Zhifan Ye)....Pages 40-49
Detecting and Preventing DDoS Attacks in SDN-Based Data Center Networks (Po-Ching Lin, Yu-Ting Hsu, Ren-Hung Hwang)....Pages 50-61
Bayesian Game Based Pseudo Honeypot Model in Social Networks (Miao Du, Yongzhong Li, Qing Lu, Kun Wang)....Pages 62-71
Conducting Correlated Laplace Mechanism for Differential Privacy (Hao Wang, Zhengquan Xu, Lizhi Xiong, Tao Wang)....Pages 72-85
A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security (Zhiniang Peng, Shaohua Tang, Linzhi Jiang)....Pages 86-99
Quantum Secret Sharing in Noisy Environment (Ming-Ming Wang, Zhi-Guo Qu, Mohamed Elhoseny)....Pages 100-112
SimHash-Based Similar Neighbor Finding for Scalable and Privacy-Preserving Service Recommendation (Yanwei Xu, Lianyong Qi)....Pages 113-122
Universally Composable Three-Party Password Authenticated Key Exchange (Qihui Zhang, Xuexian Hu, Jianghong Wei, Wenfen Liu)....Pages 123-137
A High-Capacity Quantum Secret Sharing Protocol Based on Single D-Level Particles (Xiang Lin, Juan Xu, Hu Liu, Xuwei Tang, Maomao Fu)....Pages 138-146
An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver (Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi)....Pages 147-161
Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling (Fan Chen, Hongjie He, Tinghuai Ma, Shu Yan)....Pages 162-174
A Mutation Approach of Detecting SQL Injection Vulnerabilities (Yanyu Huang, Chuan Fu, Xuan Chen, Hao Guo, Xiaoyu He, Jin Li et al.)....Pages 175-188
A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing (Fan Wu, Lili Xu)....Pages 189-200
An Anonymous User Authentication and Key Distribution Protocol for Heterogenous Wireless Sensor Network (Xin Zhang, Fengtong Wen)....Pages 201-215
Privacy-Preserving Multi-party Aggregate Signcryption for Heterogeneous Systems (Shufen Niu, Zhenbin Li, Caifen Wang)....Pages 216-229
An Enhanced Method of Trajectory Privacy Preservation Through Trajectory Reconstruction (Yan Dai, Jie Shao)....Pages 230-243
Efficient and Short Identity-Based Deniable Authenticated Encryption (Chunhua Jin, Jianyang Zhao)....Pages 244-255
Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme (Gang Du, Chunguang Ma, Zengpeng Li, Ding Wang)....Pages 256-267
Privacy-Preserving Medical Information Systems Using Multi-authority Content-Based Encryption in Cloud (Rui Guo, Xiong Li, Dong Zheng)....Pages 268-279
Detect Storage Vulnerability of User-Input Privacy in Android Applications with Static and Dynamic Analysis (Li Jiang, Yi Zhuang)....Pages 280-291
Certificateless Cryptography with KGC Trust Level 3 Revisited (Fei Li, Wei Gao, Dongqing Xie, Chunming Tang)....Pages 292-304
Server-Less Lightweight Authentication Protocol for RFID System (Jing Li, Zhiping Zhou, Ping Wang)....Pages 305-314
Efficient CP-ABE with Non-monotonic Access Structures (Yong Cheng, Huaizhe Zhou, Jun Ma, Zhiying Wang)....Pages 315-325
Image Authentication Based on Least Significant Bit Hiding and Double Random Phase Encoding Technique (Faliu Yi, Yousun Jeoung, Ruili Geng, Inkyu Moon)....Pages 326-335
On-Line Intrusion Detection Model Based on Approximate Linear Dependent Condition with Linear Latent Feature Extraction (Jian Tang, Meijuan Jia, Jian Zhang, Meiying Jia)....Pages 336-345
Differential Direction Adaptive Based Reversible Information Hiding (Feipeng Lin, Bo Wang, Yabin Li)....Pages 346-356
Detection of Jitterbug Covert Channel Based on Partial Entropy Test (Hao Wang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai)....Pages 357-368
Front Matter ....Pages 369-369
Frame-Deletion Detection for Static-Background Video Based on Multi-scale Mutual Information (Yanjia Zhao, Tianming Pang, Xiaoyun Liang, Zhaohong Li)....Pages 371-384
Learning Based Fast H.264/AVC to HEVC INTRA Video Transcoding for Cloud Media Computing (Yun Zhang, Na Li, Zongju Peng)....Pages 385-395
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression (Juan Chen, Fei Peng, Min Long)....Pages 396-407
Spatial-Temporal Correlation Based Multi-resolution Hybrid Motion Estimation for Frame Rate Up-Conversion (Bingyu Ji, Ran Li, Changan Wu)....Pages 408-417
A Robust Seam Carving Forgery Detection Approach by Three-Element Joint Density of Difference Matrix (Wenwu Gu, Gaobo Yang, Dengyong Zhang, Ming Xia)....Pages 418-432
Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold (Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu)....Pages 433-440
Kernel Searching Strategy for Recommender Searching Mechanism (Li Zhou, Weiwei Yuan, Kangya He, Chenliang Li, Qiang Li)....Pages 441-449
A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar Images (Zhiguo Qu, Zhenwen Cheng, Mingming Wang)....Pages 450-460
Adaptive Hybrid Wavelet Regularization Method for Compressive Imaging (Lingjun Liu, Weiyu Yu, Cui Yang)....Pages 461-470
Registration of OCT Fundus Images with Color Fundus Images Based on Invariant Features (Ping Li, Qiang Chen, Wen Fan, Songtao Yuan)....Pages 471-482
View-Based 3D Model Retrieval Based on Distance Learning (Yang Shi, Nannan Liu, Xingjian Long, Lei Xu)....Pages 483-493
PCANet for Color Image Classification in Various Color Spaces (Jiasong Wu, Shijie Qiu, Rui Zeng, Lotfi Senhadji, Huazhong Shu)....Pages 494-505
A Method of Group Behavior Analysis for Enhanced Affinity Propagation (Xinning Li, Zhiping Zhou, Lele Liu)....Pages 506-517
A Median Filtering Forensics Approach Based on Machine Learning (Bin Yang, Zhenyu Li, Weifeng Hu, Enguo Cao)....Pages 518-527
Spatiotemporal Radio Tomographic Imaging with Bayesian Compressive Sensing for RSS-Based Indoor Target Localization (Baolin Shang, Jiaju Tan, Xiaobing Hong, Xuemei Guo, Guoli Wang, Gonggui Liu et al.)....Pages 528-540
Detection in SAR Images Based on Histogram and Improved Elitist Genetic Fuzzy Clustering (Ronghua Shang, Weitong Zhang, Licheng Jiao)....Pages 541-553
Research on Cognitive Radio Spectrum Sensing Method Based on Information Geometry (Qiang Chen, Pin Wan, Yonghua Wang, Jiangfan Li, Yirui Xiao)....Pages 554-564
Android Malware Detection Using Hybrid Analysis and Machine Learning Technique (Fan Yang, Yi Zhuang, Jun Wang)....Pages 565-575
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems (Huibing Wang, Mingwei Lin, Jinbo Xiong, Li Lin, Ruliang Xiao)....Pages 576-588
Biclustering Evolutionary Spatiotemporal Community in Global Trading Network (Leiming Yan, Zeyu Chen, Ping Zang)....Pages 589-598
Front Matter ....Pages 599-599
Cost Optimization for Time-Bounded Request Scheduling in Geo-Distributed Datacenters (Xiaohui Wei, Lanxin Li, Xingwang Wang, Yuanyuan Liu)....Pages 601-610
The Application of Naive Bayes Classifier in Name Disambiguation (Na Li, Jin Han)....Pages 611-618
Mobility Prediction-Based Service Scheduling Optimization Algorithm in Cloudlets (Lei Shi, Xi Fu, Jing Li)....Pages 619-630
Single Appliance Recognition Using Statistical Features Based k-NN Classification (Qi Liu, Hao Wu, Xiaodong Liu, Nigel Linge)....Pages 631-640
Performance Measurement and Configuration Optimization of Virtual Machines Based on the Bayesian Network (Jia Hao, Binbin Zhang, Kun Yue, Juan Wang, Hao Wu)....Pages 641-652
Image Recapture Detection Through Residual-Based Local Descriptors and Machine Learning (Jian Li, Guojing Wu)....Pages 653-660
A Method Towards Community Detection Based on Estimation of Distribution Algorithm (Yawen Chen, Wenan Tan, Yibo Pan)....Pages 661-671
Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian Process (Yuling Liu, Qi Li, Guojiang Xin)....Pages 672-683
HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable Computing (Yan Liu, Wentao Zhao, Qiang Liu, Linyuan Yu, Dongxu Wang)....Pages 684-693
An Improved Quantum-Inspired Evolutionary Algorithm for Knapsack Problems (Sheng Xiang, Yigang He, Liuchen Chang, Kehan Wu, Chaolong Zhang)....Pages 694-708
Output-Based Sampled Data Control for Linear Systems: A Measurement Error Estimation Approach (Yuelin Shen, Wenbing Zhang)....Pages 709-716
Adaptive Firefly Algorithm with a Modified Attractiveness Strategy (Wenjun Wang, Hui Wang, Jia Zhao, Li Lv)....Pages 717-726
Newton Method for Interval Predictor Model with Sphere Parameter Set (Xuan Xiao, Peng Wang, Jian-Hong Wang)....Pages 727-737
A Conjugate Gradient Algorithm with Yuan-Wei-Lu Line Search (Gonglin Yuan, Wujie Hu, Zhou Sheng)....Pages 738-746
IU-PMF: Probabilistic Matrix Factorization Model Fused with Item Similarity and User Similarity (Yilong Shi, Hong Lin, Yuqiang Li)....Pages 747-758
New Delay-Dependent Stability for Neutral Systems with Its Application to Partial Circuit Model (Tao Li, Ting Wang, Jin Deng, Li Zhang)....Pages 759-771
A Quantitative Evaluation Method of Surveillance Coverage of UAVs Swarm (Wei Li, Changxin Huang, Kaimin Chen, Songchen Han)....Pages 772-782
Chaos Prediction of Fast Fading Channel of Multi-rates Digital Modulation Using Support Vector Machines (Yijing Ren, Ren Ren)....Pages 783-790
Front Matter ....Pages 791-791
System Log-Based Android Root State Detection (Junjie Jin, Wei Zhang)....Pages 793-798
Quantified Attribute Access Control Model for Cloud Storage Platform (DongMin Li, Jing Li, Sai Liu, Chao Wang)....Pages 799-804
Dynamically-Enabled Defense Effectiveness Evaluation in Home Internet Based on Vulnerability Analysis (Ting Wang, Min Lei, Jingjie Chen, Shiqi Deng, Yu Yang)....Pages 805-815
The Formal Transformation of AADL Based on Z-CoIA (Fugao Zhang, Zining Cao)....Pages 816-822
Masking Signature Data Errors of Software-Based Control Flow Checking Techniques Employing Redundancy Signature (Liping Liu, Linlin Ci, Wei Liu)....Pages 823-828
The Analysis of Key Nodes in Complex Social Networks (Yibo Pan, Wenan Tan, Yawen Chen)....Pages 829-836
Novel Schemes for Bike-Share Service Authentication Using Aesthetic QR Code and Color Visual Cryptography (Li Li, Lina Li, Shanqing Zhang, Zaorang Yang, Jianfeng Lu, Chin-Chen Chang)....Pages 837-842
An Improved RFID Search Protocol (Ping Wang, Zhiping Zhou)....Pages 843-848
A Developmental Evolutionary Algorithm for 0-1 Knapsack Problem (Ming Zhong, Bo Xu)....Pages 849-854
WiSmart : Robust Human Access and Identification for Smart Homes Using WiFi Signals (Shangqing Liu, Yanchao Zhao, Bing Chen)....Pages 855-861
Robust Face Recognition Model with Adaptive Correction Term via Generalized Alternating Direction Method of Multipliers (Can Wu, Yunhai Xiao, Wen-Jie Liu)....Pages 862-873
Back Matter ....Pages 875-879