P. Ren, X. Wang, H. Sun, F. Xu-multi-cloud-environments, and .. , Baokang Zhao, and Chunqing Wu Identification of Corrupted Cloud Storage in Batch Auditing for 221 Sooyeon Shin, Seungyeon Kim, and Taekyoung Kwon Multimedia Security Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from, Image Display Device, p.229

.. Secure-image-deduplication-in-cloud-storage, 243 Han Gang, Hongyang Yan, and Lingling Xu Cryptography Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse, p.255

B. Liu, B. Zhao, C. Wu-analytics, and .. , Wanrong Yu, and Ilsun You Big Data and Text Mining DCODE: A Distributed Column-Oriented Database Engine for Big Data, p.289
DOI : 10.1007/978-3-319-24315-3_30

Y. Liu, F. Cao, M. Mortazavi, M. Chen, N. Yan et al., Yuhu Wang, and Fan Fang Incorporating Big Data Analytics into Enterprise Information Systems 300 Zhaohao Sun, Francisca Pambel, and Fangwei Wang Contents XIII Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment, p.310

M. Sarnovský, P. Butka, P. Bednár, and .. , Franti?ek Babi?, and Ján Parali? Social Impact of EIS and Visualization Corporate Social Responsibility in Social Media Environment, p.323

D. Kiwana and B. , and Sven Carlsson Software Model Creation with Multidimensional UML, p.343