Read While You Wait - Get immediate ebook access, if available*, when you order a print book

Communications in Computer and Information Science

Applications and Techniques in Information Security

8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

Editors: Batten, L., Kim, D.S., Zhang, X., Li, G. (Eds.)

Free Preview

Buy this book

eBook 53,49 €
price for Spain (gross)
  • ISBN 978-981-10-5421-1
  • Digitally watermarked, DRM-free
  • Included format: PDF, EPUB
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover 67,59 €
price for Spain (gross)
  • ISBN 978-981-10-5420-4
  • Free shipping for individuals worldwide. COVID-19 shipping restrictions apply.
  • Immediate ebook access, if available*, with your print order
  • Usually ready to be dispatched within 3 to 5 business days.
  • The final prices may differ from the prices shown due to specifics of VAT rules
About this book

This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

Table of contents (18 chapters)

Table of contents (18 chapters)
  • Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems

    Pages 3-13

    Kedziora, Michal (et al.)

  • Security Analysis of a Design Variant of Randomized Hashing

    Pages 14-22

    Gauravaram, Praveen (et al.)

  • Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer

    Pages 23-34

    Yalame, Mohammad Hossein (et al.)

  • An Efficient Non-transferable Proxy Re-encryption Scheme

    Pages 35-47

    Sharmila Deva Selvi, S. (et al.)

  • Rounding Technique’s Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce

    Pages 48-57

    Qin, Wenjie (et al.)

Buy this book

eBook 53,49 €
price for Spain (gross)
  • ISBN 978-981-10-5421-1
  • Digitally watermarked, DRM-free
  • Included format: PDF, EPUB
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover 67,59 €
price for Spain (gross)
  • ISBN 978-981-10-5420-4
  • Free shipping for individuals worldwide. COVID-19 shipping restrictions apply.
  • Immediate ebook access, if available*, with your print order
  • Usually ready to be dispatched within 3 to 5 business days.
  • The final prices may differ from the prices shown due to specifics of VAT rules
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Applications and Techniques in Information Security
Book Subtitle
8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings
Editors
  • Lynn Batten
  • Dong Seong Kim
  • Xuyun Zhang
  • Gang Li
Series Title
Communications in Computer and Information Science
Series Volume
719
Copyright
2017
Publisher
Springer Singapore
Copyright Holder
Springer Nature Singapore Pte Ltd.
eBook ISBN
978-981-10-5421-1
DOI
10.1007/978-981-10-5421-1
Softcover ISBN
978-981-10-5420-4
Series ISSN
1865-0929
Edition Number
1
Number of Pages
XIV, 223
Number of Illustrations
68 b/w illustrations
Topics

*immediately available upon purchase as print book shipments may be delayed due to the COVID-19 crisis. ebook access is temporary and does not include ownership of the ebook. Only valid for books with an ebook version. Springer Reference Works and instructor copies are not included.