Applications and Techniques in Information Security 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / [electronic resource] : edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten. - 1st ed. 2015. - XVII, 398 p. 147 illus. in color. online resource. - Communications in Computer and Information Science, 557 1865-0929 ; . - Communications in Computer and Information Science, 557 .

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015.  The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

9783662486832

10.1007/978-3-662-48683-2 doi


Computer science.
Computer security.
Data encryption (Computer science).
Algorithms.
Computer Science.
Systems and Data Security.
Data Encryption.
Algorithm Analysis and Problem Complexity.

QA76.9.A25

005.8