Title :
Table of contents - Volume II
Abstract :
The following topics are dealt with: trusted computing; Big Data; data security; recommender systems; reputation systems; wireless sensor networks; cloud computing; social computing; software security; OS security; application security; network security; authentication system; cryptography; wireless security; IoT; data privacy; Internet of Things; and UbiSafe computing.
Conference_Titel :
Trustcom/BigDataSE/ISPA, 2015 IEEE
DOI :
10.1109/Trustcom.2015.545