Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Applications and techniques in infor...
~
(1998 :)
Applications and techniques in information security11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Applications and techniques in information securityedited by Lejla Batina, Gang Li.
Reminder of title:
11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
remainder title:
ATIS 2020
other author:
Batina, Lejla.
corporate name:
Published:
Singapore :Springer Singapore :2020.
Description:
ix, 123 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Computer securityCongresses.
Online resource:
https://doi.org/10.1007/978-981-33-4706-9
ISBN:
9789813347069$q(electronic bk.)
Applications and techniques in information security11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
Applications and techniques in information security
11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /[electronic resource] :ATIS 2020edited by Lejla Batina, Gang Li. - Singapore :Springer Singapore :2020. - ix, 123 p. :ill. (some col.), digital ;24 cm. - Communications in computer and information science,13381865-0929 ;. - Communications in computer and information science ;229..
A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher.
This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.
ISBN: 9789813347069$q(electronic bk.)
Standard No.: 10.1007/978-981-33-4706-9doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / A67 2020
Dewey Class. No.: 005.8
Applications and techniques in information security11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
LDR
:02291nmm a2200361 a 4500
001
589377
003
DE-He213
005
20201130062310.0
006
m d
007
cr nn 008maaau
008
210601s2020 si s 0 eng d
020
$a
9789813347069$q(electronic bk.)
020
$a
9789813347052$q(paper)
024
7
$a
10.1007/978-981-33-4706-9
$2
doi
035
$a
978-981-33-4706-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A67 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A872 2020
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Applications and techniques in information security
$h
[electronic resource] :
$b
11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
$c
edited by Lejla Batina, Gang Li.
246
3
$a
ATIS 2020
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
ix, 123 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
1338
505
0
$a
A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher.
520
$a
This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Computer Communication Networks.
$3
218087
700
1
$a
Batina, Lejla.
$3
700093
700
1
$a
Li, Gang.
$3
714538
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
229.
$3
547963
856
4 0
$u
https://doi.org/10.1007/978-981-33-4706-9
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000191812
電子館藏
1圖書
電子書
EB QA76.9.A25 A872 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-981-33-4706-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login