Cloud Computing, Security, Privacy in New Computing Environments
7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
Chapter and Conference Paper
As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If the...
Book and Conference Proceedings
7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings
Chapter and Conference Paper
The traditional data masking systems cannot provide reversible operations for database, and they will destroy the referential integrity of database. To solve the problems above, we provide a new data masking s...
Chapter and Conference Paper
We studied the problem on applying format-preserving encryption (FPE) to character data, specifically the uncertainty of the binary size of ciphertexts caused by variable-width encoding. In this paper, we sugg...
Article
As cloud computing becomes prevalent, electronic health record (EHR) system has appeared in the form of patient centric, in which more and more sensitive information from patients is being uploaded into the cl...
Article
Energy conservation is one of the central challenges for the transportation system today. A variety of microscopic vehicle fuel consumption models have been developed to support eco-friendly transport strategi...
Article
Recommendation systems are essential tools for piquing consumers’ interests and stimulating consumption in today’s electronic commerce, and the quality of these systems depends on the employed filtering algori...
Chapter
The task of searchable encryption schemes in multi-user setting is to handle the problem of dynamical user injection and revocation with consideration of feasibility. Especially, we have to make sure that user...