DSpace Repository

Applications and Techniques in Information Security [electronic resource] : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten.

Show simple item record

dc.contributor.author Niu, Wenjia. editor.
dc.contributor.author Li, Gang. editor.
dc.contributor.author Liu, Jiqiang. editor.
dc.contributor.author Tan, Jianlong. editor.
dc.contributor.author Guo, Li. editor.
dc.contributor.author Han, Zhen. editor.
dc.contributor.author Batten, Lynn. editor.
dc.contributor.author SpringerLink (Online service)
dc.date.accessioned 2017-12-02T16:03:09Z
dc.date.available 2017-12-02T16:03:09Z
dc.date.created 2015.
dc.date.issued 2015
dc.identifier.isbn 9783662486832
dc.identifier.uri http://dspace.conacyt.gov.py/xmlui/handle/123456789/23519
dc.description XVII, 398 p. 147 illus. in color.
dc.description.abstract This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
dc.language eng
dc.publisher Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015.
dc.relation.ispartofseries Springer eBooks
dc.relation.ispartofseries Communications in Computer and Information Science, 1865-0929 ; 557
dc.relation.ispartofseries Communications in Computer and Information Science, 1865-0929 ; 557
dc.relation.uri http://cicco.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-662-48683-2
dc.subject Computer science.
dc.subject Computer security.
dc.subject Data encryption (Computer science).
dc.subject Algorithms.
dc.subject Computer Science.
dc.subject Systems and Data Security.
dc.subject Data Encryption.
dc.subject Algorithm Analysis and Problem Complexity.
dc.subject.ddc 005.8 23
dc.subject.lcc QA76.9.A25
dc.subject.other Computer Science (Springer-11645)
dc.title Applications and Techniques in Information Security [electronic resource] : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten.
dc.type text
dc.identifier.doi 10.1007/978-3-662-48683-2
dc.description.edition 1st ed. 2015.
dc.identifier.bib 978-3-662-48683-2
dc.format.rdamedia computer
dc.format.rdacarrier online resource
dc.format.rda text file PDF


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account