𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cloud Computing and Security: Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I

✍ Scribed by Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino (eds.)


Publisher
Springer International Publishing
Year
2016
Tongue
English
Leaves
502
Series
Lecture Notes in Computer Science 10039
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016.

The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.

✦ Table of Contents


Front Matter....Pages I-XIX
Front Matter....Pages 1-1
A Blind Image Watermarking Algorithm in the Combine Domain....Pages 3-17
Reversible Contrast Enhancement....Pages 18-27
On Improving Homomorphic Encryption-Based Reversible Data Hiding....Pages 28-38
Coverless Information Hiding Method Based on Multi-keywords....Pages 39-47
Reversible Data Hiding with Low Bit-Rate Growth in H.264/AVC Compressed Video by Adaptive Hybrid Coding....Pages 48-62
An Information Hiding Algorithm for HEVC Based on Differences of Intra Prediction Modes....Pages 63-74
Improvement of Universal Steganalysis Based on SPAM and Feature Optimization....Pages 75-83
Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices....Pages 84-93
Improved Separable Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction....Pages 94-103
Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding....Pages 104-113
Schur Decomposition Based Robust Watermarking Algorithm in Contourlet Domain....Pages 114-124
Improved Uniform Embedding for Efficient JPEG Steganography....Pages 125-133
A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast Enhancement....Pages 134-144
Coverless Text Information Hiding Method Based on the Word Rank Map....Pages 145-155
A Phishing Webpage Detecting Algorithm Using Webpage Noise and N-Gram....Pages 156-165
A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping....Pages 166-177
A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song Dynasty....Pages 178-189
Front Matter....Pages 191-191
Multi-objective Ant Colony Optimization Algorithm Based on Load Balance....Pages 193-205
A Novel Spatio-Temporal Data Storage and Index Method for ARM-Based Hadoop Server....Pages 206-216
An Efficient Hierarchical Comparison Mechanism for Cloud-Based Heterogeneous Product Lifecycle Management Systems....Pages 217-228
Front Matter....Pages 191-191
Automatic Classification of Cloud Service Based on Weighted Euclidean Distance....Pages 229-239
A Conflict Prevention Scheduling Strategy for Shared-State Scheduling in Large Scale Cluster....Pages 240-250
Design and Performance Comparison of Modular Multipliers Implemented on FPGA Platform....Pages 251-260
Cloud-Based Video Surveillance System Using EFD-GMM for Object Detection....Pages 261-272
Enhanced Edge Detection Technique for Satellite Images....Pages 273-283
Phone Call Detection Based on Smartphone Sensor Data....Pages 284-295
A Survey of Speculative Execution Strategy in MapReduce....Pages 296-307
Front Matter....Pages 309-309
Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing....Pages 311-321
Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion....Pages 322-334
A Note on β€œIPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model”....Pages 335-342
Supervised Nonlinear Latent Feature Extraction and Regularized Random Weights Neural Network Modeling for Intrusion Detection System....Pages 343-354
A Revocable Certificateless Signature Scheme Without Pairing....Pages 355-364
Privacy Protection of Digital Speech Based on Homomorphic Encryption....Pages 365-376
Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction....Pages 377-388
Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing....Pages 389-408
Location Privacy Protected Recommendation System in Mobile Cloud....Pages 409-420
An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password....Pages 421-431
A Privacy-Preserving Online Reverse Multi-attributes Auction Scheme Based on Degree-Matching....Pages 432-442
TransPro: Mandatory Sensitive Information Protection Based on Virtualization and Encryption....Pages 443-455
Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks....Pages 456-467
Front Matter....Pages 309-309
An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking....Pages 468-474
Distributed Quantum Computation Assisted by Remote Toffoli Gate....Pages 475-485
Back Matter....Pages 487-490

✦ Subjects


Information Systems Applications (incl. Internet);Computer Communication Networks;Algorithm Analysis and Problem Complexity;Management of Computing and Information Systems;Data Encryption;Computers and Society


πŸ“œ SIMILAR VOLUMES


Cloud Computing and Security: Second Int
✍ Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino (eds.) πŸ“‚ Library πŸ“… 2016 πŸ› Springer International Publishing 🌐 English

<p><p>This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. </p><p>The 97 papers of these volumes were carefully reviewed and s

Cloud Computing and Security: Third Inte
✍ Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino (eds.) πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p><p>This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly</p><p>refereed post-conference proceedings of the Third International</p><p>Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing,</p><p>China, in June 2017.</p><p></p><p>The 116 full papers and 11 short

Cloud Computing and Security: Third Inte
✍ Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino (eds.) πŸ“‚ Library πŸ“… 2017 πŸ› Springer International Publishing 🌐 English

<p><p>This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.</p><p></p><p>The 116 full papers and 11 short papers of these v

Cloud Computing and Security: First Inte
✍ Zhiqiu Huang, Xingming Sun, Junzhou Luo, Jian Wang (eds.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer International Publishing 🌐 English

<p><div>This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 in Nanjing, China.

Cloud Computing and Security: 4th Intern
✍ Xingming Sun, Zhaoqing Pan, Elisa Bertino πŸ“‚ Library πŸ“… 2018 πŸ› Springer International Publishing 🌐 English

<p>This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected fro

Cloud Computing and Security: 4th Intern
✍ Xingming Sun, Zhaoqing Pan, Elisa Bertino πŸ“‚ Library πŸ“… 2018 πŸ› Springer International Publishing 🌐 English

<p>This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected fro