default search action
Search dblp for Publications
export results for "toc:db/conf/icccsec/icccsec2016-1.bht:"
@inproceedings{DBLP:conf/icccsec/0001LMTY16, author = {Qi Jiang and Bingyan Li and Jianfeng Ma and Youliang Tian and Yuanyuan Yang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {311--321}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_28}, doi = {10.1007/978-3-319-48671-0\_28}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/0001LMTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CaoFY16, author = {Bing Cao and Guorui Feng and Zhaoxia Yin}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Optimizing Feature for {JPEG} Steganalysis via Gabor Filter and Co-occurrences Matrices}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {84--93}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_8}, doi = {10.1007/978-3-319-48671-0\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CaoFY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenHNY16, author = {Haishan Chen and Wien Hong and Jiangqun Ni and Junying Yuan}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast Enhancement}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {134--144}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_13}, doi = {10.1007/978-3-319-48671-0\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenHNY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ChenLW16, author = {Mengting Chen and Yang Li and Jian Wang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Another {SPA} Key Recovery Against Random Order Countermeasures for {AES} Key Expansion}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {322--334}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_29}, doi = {10.1007/978-3-319-48671-0\_29}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ChenLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CimatoDMY16, author = {Stelvio Cimato and Ernesto Damiani and Silvia Mella and Ching{-}Nung Yang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Key Recovery in Public Clouds: {A} Survey on Cross-VM Side Channel Attacks}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {456--467}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_40}, doi = {10.1007/978-3-319-48671-0\_40}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CimatoDMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/CohenQ16, author = {Mikayla Cohen and Yanzhen Qu}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {An Efficient Hierarchical Comparison Mechanism for Cloud-Based Heterogeneous Product Lifecycle Management Systems}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {217--228}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_20}, doi = {10.1007/978-3-319-48671-0\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/CohenQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/DengHPPQ16, author = {Qiong Deng and Huajun Huang and Liangmin Pan and Shuang Pang and Jiaohua Qin}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Phishing Webpage Detecting Algorithm Using Webpage Noise and N-Gram}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {156--165}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_15}, doi = {10.1007/978-3-319-48671-0\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/DengHPPQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/FuC16, author = {Zhangjie Fu and Xinyue Cao}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {An Outsourcing Data Storage Scheme Supporting Privacy Preserving and Data Hiding Based on Digital Watermarking}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {468--474}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_41}, doi = {10.1007/978-3-319-48671-0\_41}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/FuC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/GuanQZ16, author = {Haiyan Guan and Hongyan Qian and Yanchao Zhao}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Location Privacy Protected Recommendation System in Mobile Cloud}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {409--420}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_36}, doi = {10.1007/978-3-319-48671-0\_36}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/GuanQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/Gupta16, author = {Renu Gupta}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Enhanced Edge Detection Technique for Satellite Images}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {273--283}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_25}, doi = {10.1007/978-3-319-48671-0\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/Gupta16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HanHYPW16, author = {Laipeng Han and Lan Huang and Xueyi Yang and Wei Pang and Kangping Wang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Novel Spatio-Temporal Data Storage and Index Method for ARM-Based Hadoop Server}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {206--216}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_19}, doi = {10.1007/978-3-319-48671-0\_19}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/HanHYPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/HeQ0ZY16, author = {Libo He and Zhenping Qiang and Lin Liu and Wei Zhou and Shaowen Yao}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Conflict Prevention Scheduling Strategy for Shared-State Scheduling in Large Scale Cluster}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {240--250}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_22}, doi = {10.1007/978-3-319-48671-0\_22}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/HeQ0ZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JaveedIW16, author = {Khalid Javeed and Daniel Irwin and Xiaojun Wang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Design and Performance Comparison of Modular Multipliers Implemented on {FPGA} Platform}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {251--260}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_23}, doi = {10.1007/978-3-319-48671-0\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/JaveedIW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/JiQT16, author = {Ping Ji and Chuan Qin and Zhenjun Tang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {104--113}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_10}, doi = {10.1007/978-3-319-48671-0\_10}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/JiQT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiLLZ16, author = {Xiong Li and Junguo Liao and Wei Liang and Jingqiang Zhao}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {421--431}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_37}, doi = {10.1007/978-3-319-48671-0\_37}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiLLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiSZ16, author = {Ce Li and Jianchen Su and Baochang Zhang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Cloud-Based Video Surveillance System Using {EFD-GMM} for Object Detection}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {261--272}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_24}, doi = {10.1007/978-3-319-48671-0\_24}, timestamp = {Fri, 23 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuJLL16, author = {Qi Liu and Dandan Jin and Xiaodong Liu and Nigel Linge}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Survey of Speculative Execution Strategy in MapReduce}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {296--307}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_27}, doi = {10.1007/978-3-319-48671-0\_27}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LiuJLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuLZD16, author = {Weiwei Liu and Guangjie Liu and Jiangtao Zhai and Yuewei Dai}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {166--177}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_16}, doi = {10.1007/978-3-319-48671-0\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiuLZD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuWWQY16, author = {Yanchen Liu and Jian Wang and Zhibin Wang and Qifeng Qu and Shun Yu}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song Dynasty}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {178--189}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_17}, doi = {10.1007/978-3-319-48671-0\_17}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiuWWQY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LouZH16, author = {Yanqiu Lou and Yi Zhuang and Ying Huo}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Automatic Classification of Cloud Service Based on Weighted Euclidean Distance}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {229--239}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_21}, doi = {10.1007/978-3-319-48671-0\_21}, timestamp = {Sun, 19 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LouZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LuoL16, author = {Mingxing Luo and Hui{-}Ran Li}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Distributed Quantum Computation Assisted by Remote Toffoli Gate}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {475--485}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_42}, doi = {10.1007/978-3-319-48671-0\_42}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/LuoL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MaGLS16, author = {Mingfan Ma and Jun Gao and Ning Lu and Wenbo Shi}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Privacy-Preserving Online Reverse Multi-attributes Auction Scheme Based on Degree-Matching}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {432--442}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_38}, doi = {10.1007/978-3-319-48671-0\_38}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/MaGLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/MinMXYM16, author = {Lei Min and LiuXiao Ming and Yang Xue and Yang Yu and Wang Mian}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Improvement of Universal Steganalysis Based on {SPAM} and Feature Optimization}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {75--83}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_7}, doi = {10.1007/978-3-319-48671-0\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/MinMXYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/PanNS16, author = {Yuanfeng Pan and Jiangqun Ni and Wenkang Su}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Improved Uniform Embedding for Efficient {JPEG} Steganography}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {125--133}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_12}, doi = {10.1007/978-3-319-48671-0\_12}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/PanNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/QianZZW16, author = {Zhenxing Qian and Xinpeng Zhang and Weiming Zhang and Yimin Wang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Reversible Contrast Enhancement}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {18--27}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_2}, doi = {10.1007/978-3-319-48671-0\_2}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/QianZZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShenSLWL16, author = {Jian Shen and Jun Shen and Xiong Li and Fushan Wei and Jiguo Li}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {389--408}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_35}, doi = {10.1007/978-3-319-48671-0\_35}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShenSLWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShenYXH16, author = {Wenting Shen and Jia Yu and Hui Xia and Rong Hao}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model"}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {335--342}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_30}, doi = {10.1007/978-3-319-48671-0\_30}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShenYXH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShengWPW16, author = {Qi Sheng and Rangding Wang and Anshan Pei and Bin Wang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {An Information Hiding Algorithm for {HEVC} Based on Differences of Intra Prediction Modes}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {63--74}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_6}, doi = {10.1007/978-3-319-48671-0\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShengWPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShiWQW16, author = {Canghong Shi and Hongxia Wang and Qing Qian and Huan Wang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Privacy Protection of Digital Speech Based on Homomorphic Encryption}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {365--376}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_33}, doi = {10.1007/978-3-319-48671-0\_33}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShiWQW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/Su16, author = {Qingtang Su}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Blind Image Watermarking Algorithm in the Combine Domain}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {3--17}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_1}, doi = {10.1007/978-3-319-48671-0\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/Su16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SunM16, author = {Huiyu Sun and Suzanne McIntosh}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Phone Call Detection Based on Smartphone Sensor Data}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {284--295}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_26}, doi = {10.1007/978-3-319-48671-0\_26}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SunM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SunZS16, author = {Yinxia Sun and Zhuoran Zhang and Limin Shen}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {A Revocable Certificateless Signature Scheme Without Pairing}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {355--364}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_32}, doi = {10.1007/978-3-319-48671-0\_32}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SunZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TangZJSS16, author = {Jian Tang and Liu Zhuo and Meiying Jia and Chunlai Sun and Chaowen Shi}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Supervised Nonlinear Latent Feature Extraction and Regularized Random Weights Neural Network Modeling for Intrusion Detection System}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {343--354}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_31}, doi = {10.1007/978-3-319-48671-0\_31}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/TangZJSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangL16, author = {Junxiang Wang and Ying Liu}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Schur Decomposition Based Robust Watermarking Algorithm in Contourlet Domain}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {114--124}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_11}, doi = {10.1007/978-3-319-48671-0\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WangWL16, author = {Tian{-}Qi Wang and Hong{-}Xia Wang and Yue Li}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Reversible Data Hiding with Low Bit-Rate Growth in {H.264/AVC} Compressed Video by Adaptive Hybrid Coding}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {48--62}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_5}, doi = {10.1007/978-3-319-48671-0\_5}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WangWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WeiZM16, author = {Fushan Wei and Ruijie Zhang and Chuangui Ma}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {377--388}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_34}, doi = {10.1007/978-3-319-48671-0\_34}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/WeiZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/WuLCL16, author = {Xiaotian Wu and Zhuoqian Liang and Bing Chen and Tong Liu}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {On Improving Homomorphic Encryption-Based Reversible Data Hiding}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {28--38}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_3}, doi = {10.1007/978-3-319-48671-0\_3}, timestamp = {Tue, 29 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/WuLCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XieLW16, author = {Xue{-}Zhi Xie and Hu{-}Qiu Liu and Yu{-}Ping Wang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {TransPro: Mandatory Sensitive Information Protection Based on Virtualization and Encryption}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {443--455}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_39}, doi = {10.1007/978-3-319-48671-0\_39}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XieLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YanCH16, author = {Shu Yan and Fan Chen and Hongjie He}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Improved Separable Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {94--103}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_9}, doi = {10.1007/978-3-319-48671-0\_9}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YanCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangSWL16, author = {Jianjun Zhang and Jun Shen and Lucai Wang and HaiJun Lin}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Coverless Text Information Hiding Method Based on the Word Rank Map}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {145--155}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_14}, doi = {10.1007/978-3-319-48671-0\_14}, timestamp = {Tue, 19 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangSWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhouMZWY16, author = {Zhili Zhou and Yan Mu and Ningsheng Zhao and Q. M. Jonathan Wu and Ching{-}Nung Yang}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Coverless Information Hiding Method Based on Multi-keywords}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {39--47}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_4}, doi = {10.1007/978-3-319-48671-0\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhouMZWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhuTTRX16, author = {Liwen Zhu and Ruichun Tang and Ye Tao and Meiling Ren and Lulu Xue}, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Multi-objective Ant Colony Optimization Algorithm Based on Load Balance}, booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, pages = {193--205}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0\_18}, doi = {10.1007/978-3-319-48671-0\_18}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ZhuTTRX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccsec/2016-1, editor = {Xingming Sun and Alex X. Liu and Han{-}Chieh Chao and Elisa Bertino}, title = {Cloud Computing and Security - Second International Conference, {ICCCS} 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10039}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48671-0}, doi = {10.1007/978-3-319-48671-0}, isbn = {978-3-319-48670-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.