Amazon cover image
Image from Amazon.com

Cloud Computing and Security [electronic resource] : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I /

Contributor(s): Material type: TextTextSeries: Information Systems and Applications, incl. Internet/Web, and HCI ; 10039Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016Description: XIX, 490 p. 171 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319486710
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.3 23
LOC classification:
  • QA76.76.A65
Online resources:
Contents:
Information Hiding -- Cloud Computing -- Cloud Security -- IOT Applications -- Multimedia Applications -- Multimedia Security and Forensics.
In: Springer Nature eBookSummary: This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Information Hiding -- Cloud Computing -- Cloud Security -- IOT Applications -- Multimedia Applications -- Multimedia Security and Forensics.

This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in