Applications and Techniques in Information Security Applications and Techniques in Information Security

Applications and Techniques in Information Security

8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

Lynn Batten và các tác giả khác
    • 39,99 US$
    • 39,99 US$

Lời Giới Thiệu Của Nhà Xuất Bản

This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

THỂ LOẠI
Máy Vi Tính & Internet
ĐÃ PHÁT HÀNH
2017
21 tháng 6
NGÔN NGỮ
EN
Tiếng Anh
ĐỘ DÀI
237
Trang
NHÀ XUẤT BẢN
Springer Nature Singapore
NGƯỜI BÁN
Springer Nature B.V.
KÍCH THƯỚC
4,4
Mb
Information and Communications Security Information and Communications Security
2016
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2023
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2020
Computer Security – ESORICS 2020 Computer Security – ESORICS 2020
2020
Information Security Applications Information Security Applications
2015
Information Security Information Security
2015
Applications and Techniques in Information Security Applications and Techniques in Information Security
2019
Applications and Techniques in Information Security Applications and Techniques in Information Security
2018
Applications and Techniques in Information Security Applications and Techniques in Information Security
2016
Computational Intelligence, Cyber Security and Computational Models Computational Intelligence, Cyber Security and Computational Models
2015
Applications and Techniques in Information Security Applications and Techniques in Information Security
2015