Skip to main content
  • Conference proceedings
  • © 2017

Applications and Techniques in Information Security

8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

Conference proceedings info: ATIS 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

    Pages I-XIV
  2. Crypto Algorithms and Applications

    1. Front Matter

      Pages 1-1
    2. Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems

      • Michal Kedziora, Yang-Wai Chow, Willy Susilo
      Pages 3-13
    3. Security Analysis of a Design Variant of Randomized Hashing

      • Praveen Gauravaram, Shoichi Hirose, Douglas Stebila
      Pages 14-22
    4. Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer

      • Mohammad Hossein Yalame, Mohammad Hossein Farzam, Siavash Bayat-Sarmadi
      Pages 23-34
    5. An Efficient Non-transferable Proxy Re-encryption Scheme

      • S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
      Pages 35-47
    6. On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES

      • Sourya Kakarla, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury
      Pages 58-72
  3. Privacy Preserving Techniques

    1. Front Matter

      Pages 73-73
    2. Private Distributed Three-Party Learning of Gaussian Mixture Models

      • Kaleb L. Leemaqz, Sharon X. Lee, Geoffrey J. McLachlan
      Pages 75-87
    3. A Privacy Preserving Platform for MapReduce

      • Sibghat Ullah Bazai, Julian Jang-Jaccard, Xuyun Zhang
      Pages 88-99
    4. Privacy-Preserving Deep Learning: Revisited and Enhanced

      • Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
      Pages 100-110
  4. Attacks

    1. Front Matter

      Pages 111-111
    2. Characterizing Promotional Attacks in Mobile App Store

      • Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
      Pages 113-127
    3. Low-Data Complexity Attacks on Camellia

      • Takeru Koie, Takanori Isobe, Yosuke Todo, Masakatu Morii
      Pages 128-140
    4. RESTful Is Not Secure

      • Tetiana Yarygina
      Pages 141-153
  5. Malware and Malicious Events Detection

    1. Front Matter

      Pages 155-155
    2. UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space

      • Ruibin Zhang, Chi Yang, Shaoning Pang, Hossein Sarrafzadeh
      Pages 157-168
    3. A Hybrid Approach for Malware Family Classification

      • Naqqash Aman, Yasir Saleem, Fahim H. Abbasi, Farrukh Shahzad
      Pages 169-180
    4. Low-Complexity Signature-Based Malware Detection for IoT Devices

      • Muhamed Fauzi Bin Abbas, Thambipillai Srikanthan
      Pages 181-189

Other Volumes

  1. Applications and Techniques in Information Security

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. 
The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

Editors and Affiliations

  • School of Information Technology, Deakin University, Geelong, Australia

    Lynn Batten

  • University of Canterbury, Christchurch, New Zealand

    Dong Seong Kim

  • The University of Auckland, Auckland, New Zealand

    Xuyun Zhang

  • Deakin University, Geelong, Australia

    Gang Li

Bibliographic Information

  • Book Title: Applications and Techniques in Information Security

  • Book Subtitle: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

  • Editors: Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li

  • Series Title: Communications in Computer and Information Science

  • DOI: https://doi.org/10.1007/978-981-10-5421-1

  • Publisher: Springer Singapore

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Nature Singapore Pte Ltd. 2017

  • Softcover ISBN: 978-981-10-5420-4Published: 24 June 2017

  • eBook ISBN: 978-981-10-5421-1Published: 21 June 2017

  • Series ISSN: 1865-0929

  • Series E-ISSN: 1865-0937

  • Edition Number: 1

  • Number of Pages: XIV, 223

  • Number of Illustrations: 68 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Algorithm Analysis and Problem Complexity

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access