Applications and Techniques in Information Security Applications and Techniques in Information Security

Applications and Techniques in Information Security

8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

Lynn Batten and Others
    • €42.99
    • €42.99

Publisher Description

This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

GENRE
Computing & Internet
RELEASED
2017
21 June
LANGUAGE
EN
English
LENGTH
237
Pages
PUBLISHER
Springer Nature Singapore
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
4.4
MB
Information and Communications Security Information and Communications Security
2016
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2023
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2020
Computer Security – ESORICS 2020 Computer Security – ESORICS 2020
2020
Information Security Applications Information Security Applications
2015
Information Security Information Security
2015
Applications and Techniques in Information Security Applications and Techniques in Information Security
2019
Applications and Techniques in Information Security Applications and Techniques in Information Security
2018
Applications and Techniques in Information Security Applications and Techniques in Information Security
2016
Computational Intelligence, Cyber Security and Computational Models Computational Intelligence, Cyber Security and Computational Models
2015
Applications and Techniques in Information Security Applications and Techniques in Information Security
2015