TY - BOOK ID - 7613873 TI - Cloud Computing and Security : Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II AU - Sun, Xingming. AU - Liu, Alex. AU - Chao, Han-Chieh. AU - Bertino, Elisa. PY - 2016 SN - 331948673X 3319486748 PB - Cham : Springer International Publishing : Imprint: Springer, DB - UniCat KW - Computer science. KW - Computer communication systems. KW - Data encryption (Computer science). KW - Algorithms. KW - Computers and civilization. KW - Computer Science. KW - Information Systems Applications (incl. Internet). KW - Computer Communication Networks. KW - Algorithm Analysis and Problem Complexity. KW - Data Encryption. KW - Computers and Society. KW - Civilization and computers KW - Algorism KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Communication systems, Computer KW - Computer communication systems KW - Data networks, Computer KW - ECNs (Electronic communication networks) KW - Electronic communication networks KW - Networks, Computer KW - Teleprocessing networks KW - Informatics KW - Civilization KW - Algebra KW - Arithmetic KW - Computer security KW - Cryptography KW - Data transmission systems KW - Digital communications KW - Electronic systems KW - Information networks KW - Telecommunication KW - Cyberinfrastructure KW - Electronic data processing KW - Network computers KW - Science KW - Foundations KW - Distributed processing KW - Computer software. KW - Cryptology. KW - Software, Computer KW - Computer systems KW - Cloud computing KW - Web services KW - Application software. KW - Application computer programs KW - Application computer software KW - Applications software KW - Apps (Computer software) KW - Computer software UR - https://www.unicat.be/uniCat?func=search&query=sysid:7613873 AB - This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics. ER -