[FOX-Ebook]Cloud Computing and Security

¥34.99 市场价 ¥899.99
库存
9999
数量
-
+
联系卖家   QQ:316821785   微信:zbook8_com  电话:13111111111   
商品特色:担保交易手动发货商品,工作人员手动发货。

自动发货宝贝:购买后直接到我买到的商品-订单详情-收货信息获取下载链接。
手动发货宝贝:购买后请留言邮箱或联系方式,0-4小时内由工作人员发到您邮箱。
购买后任何问题请联系商家或直接联系本站站务微信或者QQ。
书籍格式:
isbn:
排版:
新旧程度:

-------如果这里没有任何信息,不是真没有,是我们懒!请复制书名上amazon搜索书籍信息。-------

This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China.

The objective of ICCCS 2015 is to provide a forum for researchers, academicians, engineers, industrial professionals, students and government officials involved in the general areas of information security and cloud computing.

Table of Contents

  • VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation
  • Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme
  • Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud
  • A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption
  • Privacy-Preserving Multidimensional Range Query on Real-Time Data
  • ARM-Based Privacy Preserving
  • Attribute-Based Encryption Without Key Escrow
  • An Efficient Access Control Optimizing Technique Based on Local Agency in Cryptographic Cloud Storage
  • Complete Separable Reversible Data Hiding in Encrypted Image
  • Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization Algorithm
  • Coverless Image Steganography Without Embedding
  • Coverless Information Hiding Method Based on the Chinese Mathematical Expression
  • System Security
  • Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by “PRISM”
  • A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks
  • The Optimization Model of Trust for White-Washing
  • Malware Clustering Based on SNN Density Using System Calls
  • Analyzing Eventual Leader Election Protocols for Dynamic Systems by Probabilistic Model Checking
  • A Dynamic Resource Allocation Model for Guaranteeing Quality of Service in Software Defined Networking Based Cloud Computing Environment
  • Research and Development of Trust Mechanism in Cloud Computing
  • Analysis of Advanced Cyber Attacks with Quantified ESM
  • A Web Security Testing Method Based on Web Application Structure
  • An Improved Data Cleaning Algorithm Based on SNM
  • Enhancing Security of IaaS Cloud with Fraternal Security Cooperation Between Cloud Platform and Virtual Platform
  • Cloud Platform
  • Cluster Analysis by Variance Ratio Criterion and Quantum-Behaved PSO
  • Failure Modes and Effects Analysis Using Multi-factors Comprehensive Weighted Fuzzy TOPSIS
  • Efficient Query Algorithm of Coallocation-Parallel-Hash-Join in the Cloud Data Center
  • Dynamic Data Driven Particle Filter for Agent-Based Traffic State Estimation
  • An Improved Dynamic Spectrum Access Scheme in Cognitive Networks
  • The Design and Implementation of a Dynamic Verification System of Z
  • Maximizing Positive Influence in Signed Social Networks
  • OpenFlow-Based Load Balancing for Wireless Mesh Network
  • SPEMS: A Stealthy and Practical Execution Monitoring System Based on VMI
  • A Total Power Control Cooperative MAC Protocol for Wireless Sensor Networks
  • Parallel Processing of SAR Imaging Algorithms for Large Areas Using Multi-GPU
  • An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform
  • Data Analysis in Cloud
  • Wind Speed and Direction Predictions Based on Multidimensional Support Vector Regression with Data-Dependent Kernel
  • Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment
  • Performance Analysis of (1+1)EA on the Maximum Independent Set Problem
  • A Robust Iris Segmentation Algorithm Using Active Contours Without Edges and Improved Circular Hough Transform
  • An Adaptive Hybrid PSO and GSA Algorithm for Association Rules Mining
  • Sequential Pattern Mining and Matching Method with Its Application on Earthquakes
  • Teaching Quality Assessment Model Based on Analytic Hierarchy Process and LVQ Neural Network
  • Fast Sparse Representation Classification Using Transfer Learning
  • Probing the Scheduling Algorithms in the Cloud Based on OpenStack
  • Top-k Distance-Based Outlier Detection on Uncertain Data
  • An Airport Noise Prediction Model Based on Selective Ensemble of LOF-FSVR
  • Application of Semantic-Based Laplacian Eigenmaps Method in 3D Model Classification and Retrieval

暂无评价
暂时没有数据

交易规则

免责声明


1、本站所有分享材料(数据、资料)均为网友上传,如有侵犯您的任何权利,请您第一时间通过微信(zbook8_com) 、QQ(316821785)、 电话(13111111111)联系本站,本站将在24小时内回复您的诉求!谢谢!
2、本站所有商品,除特殊说明外,均为(电子版)Ebook,请购买分享内容前请务必注意。特殊商品有说明实物的,按照说明为准。

发货方式


1、自动:在上方保障服务中标有自动发货的宝贝,拍下后,将会自动收到来自卖家的宝贝获取(下载)链接   [个人中心->我的订单->点击订单 查看详情];
2、手动:未标有自动发货的的宝贝,拍下后,通过QQ或订单中的电话联系对方。

退款说明


1、描述:书籍描述(含标题)与实际不一致的(例:描述PDF,实际为epub、缺页少页、版本不符等);
2、链接:部分图书会给出链接,直接链接到官网或者其他站点,以便于提示,如与给出不符等;
3、发货:手动发货书籍,在卖家未发货前,已申请退款的;
4、其他:如质量方面的硬性常规问题等。
注:经核实符合上述任一,均支持退款,但卖家予以积极解决问题则除外。交易中的商品,卖家无法对描述进行修改!

注意事项


1、在未购买下前,双方在QQ上所商定的内容,亦可成为纠纷评判依据(商定与描述冲突时,商定为准);
2、在宝贝同时有网站演示与图片演示,且站演与图演不一致时,默认按图演作为纠纷评判依据(特别声明或有商定除外);
3、在没有"无任何正当退款依据"的前提下,写有"一旦售出,概不支持退款"等类似的声明,视为无效声明;
4、虽然交易产生纠纷的几率很小,但请尽量保留如聊天记录这样的重要信息,以防产生纠纷时便于网站工作人员介入快速处理。