Applications and Techniques in Information Security Applications and Techniques in Information Security

Applications and Techniques in Information Security

6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings

    • 42,99 €
    • 42,99 €

Description de l’éditeur

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy.

GENRE
Informatique et Internet
SORTIE
2016
26 septembre
LANGUE
EN
Anglais
LONGUEUR
179
Pages
ÉDITIONS
Springer Nature Singapore
DÉTAILS DU FOURNISSEUR
Springer Science & Business Media LLC
TAILLE
3,6
Mo
Information Security Applications Information Security Applications
2016
Information and Communications Security Information and Communications Security
2016
Information Security Information Security
2015
Innovative Security Solutions for Information Technology and Communications Innovative Security Solutions for Information Technology and Communications
2016
Information Security Information Security
2020
Information Security Applications Information Security Applications
2019
Applications and Techniques in Information Security Applications and Techniques in Information Security
2019
Applications and Techniques in Information Security Applications and Techniques in Information Security
2018
Applications and Techniques in Information Security Applications and Techniques in Information Security
2017
Computational Intelligence, Cyber Security and Computational Models Computational Intelligence, Cyber Security and Computational Models
2015
Applications and Techniques in Information Security Applications and Techniques in Information Security
2015