Editors:
Part of the book series: Communications in Computer and Information Science (CCIS, volume 1116)
Conference series link(s): ATIS: International Conference on Applications and Techniques in Information Security
Conference proceedings info: ATIS 2019.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (24 papers)
-
Front Matter
-
Information Security
-
Front Matter
-
-
Network Security
-
Front Matter
-
-
Intrusion Detection System
-
Front Matter
-
About this book
The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.
Editors and Affiliations
-
School of Computing, SASTRA University, Thanjavur, India
V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi
-
School of Information Technology, Deakin University, Geelong, Australia
Leo Zhang, Lynn Batten, Gang Li
Bibliographic Information
Book Title: Applications and Techniques in Information Security
Book Subtitle: 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings
Editors: V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li
Series Title: Communications in Computer and Information Science
DOI: https://doi.org/10.1007/978-981-15-0871-4
Publisher: Springer Singapore
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Singapore Pte Ltd. 2019
Softcover ISBN: 978-981-15-0870-7Published: 15 October 2019
eBook ISBN: 978-981-15-0871-4Published: 15 November 2019
Series ISSN: 1865-0929
Series E-ISSN: 1865-0937
Edition Number: 1
Number of Pages: XI, 313
Number of Illustrations: 56 b/w illustrations, 101 illustrations in colour
Topics: Systems and Data Security, Security, Legal Aspects of Computing, Artificial Intelligence, Information Systems Applications (incl. Internet), Computer Communication Networks