03626nam 22007455 450 991035785020332120230706193608.0981-15-0871-210.1007/978-981-15-0871-4(CKB)4100000009844698(DE-He213)978-981-15-0871-4(MiAaPQ)EBC5978843(PPN)260301647(EXLCZ)99410000000984469820191014d2019 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierApplications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings /edited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li1st ed. 2019.Singapore :Springer Nature Singapore :Imprint: Springer,2019.1 online resource (XI, 313 p. 157 illus., 101 illus. in color.) Communications in Computer and Information Science,1865-0937 ;1116981-15-0870-4 Information Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. .This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications. .Communications in Computer and Information Science,1865-0937 ;1116Data protectionComputers—Law and legislationInformation technology—Law and legislationArtificial intelligenceApplication softwareComputer networksData and Information SecurityLegal Aspects of ComputingArtificial IntelligenceComputer and Information Systems ApplicationsComputer Communication NetworksData protection.Computers—Law and legislation.Information technology—Law and legislation.Artificial intelligence.Application software.Computer networks.Data and Information Security.Legal Aspects of Computing.Artificial Intelligence.Computer and Information Systems Applications.Computer Communication Networks.005.8Shankar Sriram V. Sedthttp://id.loc.gov/vocabulary/relators/edtSubramaniyaswamy Vedthttp://id.loc.gov/vocabulary/relators/edtSasikaladevi Nedthttp://id.loc.gov/vocabulary/relators/edtZhang Leoedthttp://id.loc.gov/vocabulary/relators/edtBatten Lynnedthttp://id.loc.gov/vocabulary/relators/edtLi Gangedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910357850203321Applications and Techniques in Information Security2028776UNINA