Applications and Techniques in Information Security -

Applications and Techniques in Information Security

11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12–13, 2020, Proceedings

Lejla Batina, Gang Li (Herausgeber)

Buch | Softcover
123 Seiten
2020 | 1st ed. 2020
Springer Verlag, Singapore
978-981-334-705-2 (ISBN)
53,49 inkl. MwSt
This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. The papers are focused on all aspects on techniques and applications in information security research.
This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research. 

A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices.- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme.- Digital Forensics for Drones: A Study of Tools and Techniques.- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output.- A New Rabin-type Cryptosystem with Modulus P^2q.- Malware Analysis Method Based Random Access Memory in Android.- Vulnerability Database as a Service for IoT.- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. 

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science ; 1338
Zusatzinfo 21 Illustrations, color; 12 Illustrations, black and white; IX, 123 p. 33 illus., 21 illus. in color.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
Schlagworte Applications • Computer Science • conference proceedings • Informatics • Research
ISBN-10 981-334-705-8 / 9813347058
ISBN-13 978-981-334-705-2 / 9789813347052
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich