02958nam 22006855 450 991029897760332120251226202922.03-662-45670-210.1007/978-3-662-45670-5(CKB)3710000000306320(SSID)ssj0001386048(PQKBManifestationID)11746788(PQKBTitleCode)TC0001386048(PQKBWorkID)11349333(PQKB)10091099(DE-He213)978-3-662-45670-5(MiAaPQ)EBC6306751(MiAaPQ)EBC5584864(Au-PeEL)EBL5584864(OCoLC)1066178644(PPN)183097467(EXLCZ)99371000000030632020141113d2014 u| 0engurnn#008mamaatxtccrApplications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings /edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren1st ed. 2014.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2014.1 online resource (XII, 266 p. 120 illus.)Communications in Computer and Information Science,1865-0937 ;490Includes index.3-662-45669-9 Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations.This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.Communications in Computer and Information Science,1865-0937 ;490Data protectionCryptographyData encryption (Computer science)Data and Information SecurityCryptologyData protection.Cryptography.Data encryption (Computer science).Data and Information Security.Cryptology.005.8Batten Lynnedthttp://id.loc.gov/vocabulary/relators/edtLi Gangedthttp://id.loc.gov/vocabulary/relators/edtNiu Wenjiaedthttp://id.loc.gov/vocabulary/relators/edtWarren Matthewedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910298977603321Applications and Techniques in Information Security2028776UNINA