Title :
[Title page i - Volume 1]
Abstract :
The following topics are dealt with: access control; cloud computing; computer network security; cryptographic protocols; grid computing; identity management; trust management; image processing; video processing; information hiding; watermarking; network communication; intelligent networked systems; intrusion detection; sensor network security; mobile network security; ad hoc network security; P2P computing; distributed systems; parallel systems; service computing; signal processing and wireless network.
Keywords :
authorisation; cloud computing; computer network security; cryptographic protocols; data encapsulation; grid computing; image watermarking; parallel processing; peer-to-peer computing; radio networks; video signal processing; P2P computing; access control; ad hoc network security; cloud computing; computer network security; cryptographic protocols; distributed systems; grid computing; identity management; image processing; information hiding; intelligent networked systems; intrusion detection; mobile network security; network communication; parallel systems; sensor network security; service computing; signal processing; trust management; video processing; watermarking; wireless network;
Conference_Titel :
Network Computing and Information Security (NCIS), 2011 International Conference on
Conference_Location :
Guilin
Print_ISBN :
978-1-61284-347-6
DOI :
10.1109/NCIS.2011.1