LEADER 02987nam 22006615 450 001 9910254820103321 005 20251225212329.0 010 $a981-10-5421-5 024 7 $a10.1007/978-981-10-5421-1 035 $a(CKB)4340000000062282 035 $a(DE-He213)978-981-10-5421-1 035 $a(MiAaPQ)EBC6299038 035 $a(MiAaPQ)EBC5592505 035 $a(Au-PeEL)EBL5592505 035 $a(OCoLC)992118745 035 $a(PPN)20299175X 035 $a(EXLCZ)994340000000062282 100 $a20170622d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $e8th International Conference, ATIS 2017, Auckland, New Zealand, July 6?7, 2017, Proceedings /$fedited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li 205 $a1st ed. 2017. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2017. 215 $a1 online resource (XIV, 223 p. 68 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v719 311 08$a981-10-5420-7 327 $aKeynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v719 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aData and Information Security 606 $aCryptology 606 $aAlgorithms 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aAlgorithms. 676 $a005.8 702 $aBatten$b Lynn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKim$b Dong Seong$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Xuyun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Gang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254820103321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA