語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Applications and techniques in infor...
~
(1998 :)
Applications and techniques in information security11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Applications and techniques in information securityedited by Lejla Batina, Gang Li.
其他題名:
11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
其他題名:
ATIS 2020
其他作者:
Batina, Lejla.
團體作者:
出版者:
Singapore :Springer Singapore :2020.
面頁冊數:
ix, 123 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer securityCongresses.
電子資源:
https://doi.org/10.1007/978-981-33-4706-9
ISBN:
9789813347069$q(electronic bk.)
Applications and techniques in information security11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
Applications and techniques in information security
11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /[electronic resource] :ATIS 2020edited by Lejla Batina, Gang Li. - Singapore :Springer Singapore :2020. - ix, 123 p. :ill. (some col.), digital ;24 cm. - Communications in computer and information science,13381865-0929 ;. - Communications in computer and information science ;229..
A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher.
This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.
ISBN: 9789813347069$q(electronic bk.)
Standard No.: 10.1007/978-981-33-4706-9doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / A67 2020
Dewey Class. No.: 005.8
Applications and techniques in information security11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
LDR
:02291nmm a2200361 a 4500
001
589377
003
DE-He213
005
20201130062310.0
006
m d
007
cr nn 008maaau
008
210601s2020 si s 0 eng d
020
$a
9789813347069$q(electronic bk.)
020
$a
9789813347052$q(paper)
024
7
$a
10.1007/978-981-33-4706-9
$2
doi
035
$a
978-981-33-4706-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A67 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A872 2020
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Applications and techniques in information security
$h
[electronic resource] :
$b
11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12-13, 2020 : proceedings /
$c
edited by Lejla Batina, Gang Li.
246
3
$a
ATIS 2020
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
ix, 123 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0929 ;
$v
1338
505
0
$a
A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher.
520
$a
This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Computer Communication Networks.
$3
218087
700
1
$a
Batina, Lejla.
$3
700093
700
1
$a
Li, Gang.
$3
714538
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
229.
$3
547963
856
4 0
$u
https://doi.org/10.1007/978-981-33-4706-9
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000191812
電子館藏
1圖書
電子書
EB QA76.9.A25 A872 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-33-4706-9
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入