03047nam 22006615 450 991029897760332120200705235104.03-662-45670-210.1007/978-3-662-45670-5(CKB)3710000000306320(SSID)ssj0001386048(PQKBManifestationID)11746788(PQKBTitleCode)TC0001386048(PQKBWorkID)11349333(PQKB)10091099(DE-He213)978-3-662-45670-5(MiAaPQ)EBC6306751(MiAaPQ)EBC5584864(Au-PeEL)EBL5584864(OCoLC)1066178644(PPN)183097467(EXLCZ)99371000000030632020141113d2014 u| 0engurnn#008mamaatxtccrApplications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings /edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren1st ed. 2014.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2014.1 online resource (XII, 266 p. 120 illus.)Communications in Computer and Information Science,1865-0929 ;490Includes index.3-662-45669-9 Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations.This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.Communications in Computer and Information Science,1865-0929 ;490Computer securityData encryption (Computer science)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer security.Data encryption (Computer science).Systems and Data Security.Cryptology.005.8Batten Lynnedthttp://id.loc.gov/vocabulary/relators/edtLi Gangedthttp://id.loc.gov/vocabulary/relators/edtNiu Wenjiaedthttp://id.loc.gov/vocabulary/relators/edtWarren Matthewedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910298977603321Applications and Techniques in Information Security2028776UNINA