Applications and Techniques in Information Security Applications and Techniques in Information Security

Applications and Techniques in Information Security

8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

Lynn Batten et autres
    • 42,99 €
    • 42,99 €

Description de l’éditeur

This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

GENRE
Informatique et Internet
SORTIE
2017
21 juin
LANGUE
EN
Anglais
LONGUEUR
237
Pages
ÉDITIONS
Springer Nature Singapore
DÉTAILS DU FOURNISSEUR
Springer Science & Business Media LLC
TAILLE
4,4
Mo
Information and Communications Security Information and Communications Security
2016
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2023
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2020
Computer Security – ESORICS 2020 Computer Security – ESORICS 2020
2020
Information Security Applications Information Security Applications
2015
Information Security Information Security
2015
Applications and Techniques in Information Security Applications and Techniques in Information Security
2019
Applications and Techniques in Information Security Applications and Techniques in Information Security
2018
Applications and Techniques in Information Security Applications and Techniques in Information Security
2016
Computational Intelligence, Cyber Security and Computational Models Computational Intelligence, Cyber Security and Computational Models
2015
Applications and Techniques in Information Security Applications and Techniques in Information Security
2015