Skip to main content
  • Conference proceedings
  • © 2015

Applications and Techniques in Information Security

6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

Conference proceedings info: ATIS 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

    Pages I-XVII
  2. Cryptograph

    1. Front Matter

      Pages 1-1
    2. An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map

      • Yuzhen Li, Xiaodong Li, Xin Jin, Geng Zhao, Shiming Ge, Yulu Tian et al.
      Pages 3-13
    3. Cryptographic Public Key Length Prediction

      • M. Amain, L. M. Batten
      Pages 27-35
    4. Public Key Timed-Release Attribute-Based Encryption

      • Ke Yuan, Nan Shen, Yonghang Yan, Zheli Liu, Chufu Jia
      Pages 65-73
    5. Color Image Encryption in CIE L*a*b* Space

      • Xin Jin, Yingya Chen, Shiming Ge, Kejun Zhang, Xiaodong Li, Yuzhen Li et al.
      Pages 74-85
  3. Evaluation, Standards and Protocols

    1. Front Matter

      Pages 87-87
    2. Discover Abnormal Behaviors Using HTTP Header Fields Measurement

      • Quan Bai, Gang Xiong, Yong Zhao, Zhenzhen Li
      Pages 89-100
    3. A Lightweight Code-Based Authentication Protocol for RFID Systems

      • Zhuohua Liu, Wei Zhang, Chuankun Wu
      Pages 114-128
    4. An Overview of Ad Hoc Network Security

      • Fan Yang, Yulan Zheng, Ping Xiong
      Pages 129-137
  4. Trust Computing and Privacy Protection

    1. Front Matter

      Pages 139-139
    2. Structural Analysis of IWA Social Network

      • Wenpeng Liu, Yanan Cao, Diying Li, Wenjia Niu, Jianlong Tan, Yue Hu et al.
      Pages 141-152
    3. A Differentially Private Method for Reward-Based Spatial Crowdsourcing

      • Lefeng Zhang, Xiaodan Lu, Ping Xiong, Tianqing Zhu
      Pages 153-164
    4. Trust Prediction with Trust Antecedent Framework Regularization

      • Haiyang He, Yong Wang, Guoyong Cai
      Pages 177-188

Other Volumes

  1. Applications and Techniques in Information Security

About this book

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. 
The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Editors and Affiliations

  • Chinese Academy of Sciences, Beijing, China

    Wenjia Niu, Jianlong Tan, Li Guo

  • Deakin University, Burwood, Australia

    Gang Li

  • Beijing Jiaotong University, Beijing, China

    Jiqiang Liu, Zhen Han

  • Fac. Science&Technology, Deakin University, Burwood, Australia

    Lynn Batten

Bibliographic Information

  • Book Title: Applications and Techniques in Information Security

  • Book Subtitle: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

  • Editors: Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten

  • Series Title: Communications in Computer and Information Science

  • DOI: https://doi.org/10.1007/978-3-662-48683-2

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2015

  • Softcover ISBN: 978-3-662-48682-5Published: 12 October 2015

  • eBook ISBN: 978-3-662-48683-2Published: 07 November 2015

  • Series ISSN: 1865-0929

  • Series E-ISSN: 1865-0937

  • Edition Number: 1

  • Number of Pages: XVII, 398

  • Number of Illustrations: 147 illustrations in colour

  • Topics: Systems and Data Security, Cryptology, Algorithm Analysis and Problem Complexity

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access