Security with Intelligent Computing and Big-data Services

Security with Intelligent Computing and Big-data Services

English | PDF,EPUB | 2018 | 377 Pages | ISBN : 3319764500 | 53.6 MB

In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Services, the Workshop on Information and Communication Security Science and Engineering, and the Workshop on Security in Forensics, Medical, and Computing Services and Applications.
The topics addressed include: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. The conference is intended to promote healthy exchanges between researchers and industry practitioners regarding advances in the state of art of these security issues. The proceedings not only highlight novel and interesting ideas, but will also stimulate interesting discussions and inspire new research directions.

Download:

http://longfiles.com/nczvn3a3bdrs/Security_with_Intelligent_Computing_and_Big-data_Services.rar.html

[Fast Download] Security with Intelligent Computing and Big-data Services


Ebooks related to "Security with Intelligent Computing and Big-data Services" :
Global Networking, Communication and Culture: Conflict or Convergence?
Information Security and Cryptology - ICISC 2017
Communications and Networking
Implantable Sensors and Systems: From Theory to Practice
Fault Diagnosis of Hybrid Dynamic and Complex Systems
Mobile Device Management
Task Scheduling for Multi-core and Parallel Architectures: Challenges, Solutions and Perspectives
The Future of Mobile Communications: Awaiting the Third Generation
Network Function Virtualization: Concepts and Applicability in 5G Networks
Intrusion Detection and Prevention for Mobile Ecosystems
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.