Skip to main content

Applications and Techniques in Information Security

6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

  • Conference proceedings
  • © 2015

Overview

Part of the book series: Communications in Computer and Information Science (CCIS, volume 557)

Included in the following conference series:

Conference proceedings info: ATIS 2015.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (35 papers)

  1. Cryptograph

  2. Evaluation, Standards and Protocols

  3. Trust Computing and Privacy Protection

Other volumes

  1. Applications and Techniques in Information Security

Keywords

About this book

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. 
The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Editors and Affiliations

  • Chinese Academy of Sciences, Beijing, China

    Wenjia Niu, Jianlong Tan, Li Guo

  • Deakin University, Burwood, Australia

    Gang Li

  • Beijing Jiaotong University, Beijing, China

    Jiqiang Liu, Zhen Han

  • Fac. Science&Technology, Deakin University, Burwood, Australia

    Lynn Batten

Bibliographic Information

  • Book Title: Applications and Techniques in Information Security

  • Book Subtitle: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

  • Editors: Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten

  • Series Title: Communications in Computer and Information Science

  • DOI: https://doi.org/10.1007/978-3-662-48683-2

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2015

  • Softcover ISBN: 978-3-662-48682-5Published: 12 October 2015

  • eBook ISBN: 978-3-662-48683-2Published: 07 November 2015

  • Series ISSN: 1865-0929

  • Series E-ISSN: 1865-0937

  • Edition Number: 1

  • Number of Pages: XVII, 398

  • Number of Illustrations: 147 illustrations in colour

  • Topics: Systems and Data Security, Cryptology, Algorithm Analysis and Problem Complexity

Publish with us