02883nam 2200541 450 99646545260331620221219230115.0981-334-706-610.1007/978-981-33-4706-9(OCoLC)1238200339(CKB)5280000000246084(MiAaPQ)EBC6417072(DE-He213)978-981-33-4706-9(PPN)252504240(EXLCZ)99528000000024608420210320d2020 uy 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierApplications and techniques in information security 11th international conference, atis 2020, brisbane, qld, australia, november 12-13, 2020, proceedings /edited by Lejla Batina, Gang Li1st ed. 2020.Singapore :Springer,[2020]©20201 online resource (IX, 123 p. 33 illus., 21 illus. in color.)Communications in Computer and Information Science,1865-0929 ;1338Includes index.981-334-705-8 A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. .This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research. .Communications in Computer and Information Science,1865-0929 ;1338Computer networksSecurity measuresCongressesComputer networksSecurity measuresComputer securityCongressesComputer networksSecurity measuresComputer networksSecurity measures.Computer security929.605Li GangBatina LejlaMiAaPQMiAaPQMiAaPQBOOK996465452603316Applications and Techniques in Information Security2028776UNISA