Normal view MARC view ISBD view

Applications and Techniques in Information Security [electronic resource] : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten.

Contributor(s): Niu, Wenjia [editor.] | Li, Gang [editor.] | Liu, Jiqiang [editor.] | Tan, Jianlong [editor.] | Guo, Li [editor.] | Han, Zhen [editor.] | Batten, Lynn [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Communications in Computer and Information Science: 557Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XVII, 398 p. 147 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783662486832.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Algorithms | Computer Science | Systems and Data Security | Data Encryption | Algorithm Analysis and Problem ComplexityAdditional physical formats: Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015.  The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015.  The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

There are no comments for this item.

Log in to your account to post a comment.