Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1350
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBatten, Lynn. ;en_US
dc.contributor.authorKim, Dong Seong. ;en_US
dc.contributor.authorZhang, Xuyun. ;en_US
dc.contributor.authorLi, Gang. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:55Z-
dc.date.available2020-05-17T08:27:55Z-
dc.date.issued2017en_US
dc.identifier.isbn9789811054211 ;en_US
dc.identifier.isbn9789811054204 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1350-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9789811054204. ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security. ;en_US
dc.description.statementofresponsibilityedited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li.en_US
dc.description.tableofcontentsKeynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. ;en_US
dc.format.extentXIV, 223 p. 68 illus. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesCommunications in Computer and Information Science, ; 1865-0929 ; ; 719. ;en_US
dc.relation.ispartofseriesCommunications in Computer and Information Science, ; 1865-0929 ; ; 719. ;en_US
dc.relation.haspart9789811054211.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectAlgorithmsen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectAlgorithm Analysis and Problem Complexity. ;en_US
dc.titleApplications and Techniques in Information Securityen_US
dc.title.alternative8th International Conference, ATIS 2017, Auckland, New Zealand, July 6ee7, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811054211.pdf12 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBatten, Lynn. ;en_US
dc.contributor.authorKim, Dong Seong. ;en_US
dc.contributor.authorZhang, Xuyun. ;en_US
dc.contributor.authorLi, Gang. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:55Z-
dc.date.available2020-05-17T08:27:55Z-
dc.date.issued2017en_US
dc.identifier.isbn9789811054211 ;en_US
dc.identifier.isbn9789811054204 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1350-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9789811054204. ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security. ;en_US
dc.description.statementofresponsibilityedited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li.en_US
dc.description.tableofcontentsKeynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. ;en_US
dc.format.extentXIV, 223 p. 68 illus. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesCommunications in Computer and Information Science, ; 1865-0929 ; ; 719. ;en_US
dc.relation.ispartofseriesCommunications in Computer and Information Science, ; 1865-0929 ; ; 719. ;en_US
dc.relation.haspart9789811054211.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectAlgorithmsen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectAlgorithm Analysis and Problem Complexity. ;en_US
dc.titleApplications and Techniques in Information Securityen_US
dc.title.alternative8th International Conference, ATIS 2017, Auckland, New Zealand, July 6ee7, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811054211.pdf12 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBatten, Lynn. ;en_US
dc.contributor.authorKim, Dong Seong. ;en_US
dc.contributor.authorZhang, Xuyun. ;en_US
dc.contributor.authorLi, Gang. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:27:55Z-
dc.date.available2020-05-17T08:27:55Z-
dc.date.issued2017en_US
dc.identifier.isbn9789811054211 ;en_US
dc.identifier.isbn9789811054204 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1350-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9789811054204. ;en_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security. ;en_US
dc.description.statementofresponsibilityedited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li.en_US
dc.description.tableofcontentsKeynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. ;en_US
dc.format.extentXIV, 223 p. 68 illus. ; online resource. ;en_US
dc.publisherSpringer Singapore :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesCommunications in Computer and Information Science, ; 1865-0929 ; ; 719. ;en_US
dc.relation.ispartofseriesCommunications in Computer and Information Science, ; 1865-0929 ; ; 719. ;en_US
dc.relation.haspart9789811054211.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Securityen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectAlgorithmsen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectData Encryption. ;en_US
dc.subjectAlgorithm Analysis and Problem Complexity. ;en_US
dc.titleApplications and Techniques in Information Securityen_US
dc.title.alternative8th International Conference, ATIS 2017, Auckland, New Zealand, July 6ee7, 2017, Proceedings /en_US
dc.typeBooken_US
dc.publisher.placeSingapore :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9789811054211.pdf12 MBAdobe PDFThumbnail
Preview File