Normal view MARC view ISBD view

Applications and Techniques in Information Security [electronic resource] : 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings / edited by Lynn Batten, Gang Li.

Contributor(s): Batten, Lynn [editor.] | Li, Gang [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Communications in Computer and Information Science: 651Publisher: Singapore : Springer Singapore : Imprint: Springer, 2016Description: XVI, 163 p. 30 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789811027413.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Algorithms | Computer Science | Systems and Data Security | Data Encryption | Algorithm Analysis and Problem ComplexityAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Invited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy.
    average rating: 0.0 (0 votes)
No physical items for this record

Invited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy.

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy.

There are no comments for this item.

Log in to your account to post a comment.