Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Communications in Computer and Information Science (CCIS, volume 557)
Included in the following conference series:
Conference proceedings info: ATIS 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (35 papers)
-
Cryptograph
-
Evaluation, Standards and Protocols
-
Trust Computing and Privacy Protection
Other volumes
-
Applications and Techniques in Information Security
Keywords
About this book
The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
Editors and Affiliations
Bibliographic Information
Book Title: Applications and Techniques in Information Security
Book Subtitle: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings
Editors: Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten
Series Title: Communications in Computer and Information Science
DOI: https://doi.org/10.1007/978-3-662-48683-2
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2015
Softcover ISBN: 978-3-662-48682-5Published: 12 October 2015
eBook ISBN: 978-3-662-48683-2Published: 07 November 2015
Series ISSN: 1865-0929
Series E-ISSN: 1865-0937
Edition Number: 1
Number of Pages: XVII, 398
Number of Illustrations: 147 illustrations in colour
Topics: Systems and Data Security, Cryptology, Algorithm Analysis and Problem Complexity