LEADER 02841nam 22006495 450 001 9910254987403321 005 20251226203316.0 010 $a981-10-2741-2 024 7 $a10.1007/978-981-10-2741-3 035 $a(CKB)3710000000873039 035 $a(DE-He213)978-981-10-2741-3 035 $a(MiAaPQ)EBC6302196 035 $a(MiAaPQ)EBC5594925 035 $a(Au-PeEL)EBL5594925 035 $a(OCoLC)959366861 035 $a(PPN)195511905 035 $a(EXLCZ)993710000000873039 100 $a20160926d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $e6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings /$fedited by Lynn Batten, Gang Li 205 $a1st ed. 2016. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2016. 215 $a1 online resource (XVI, 163 p. 30 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v651 311 08$a981-10-2740-4 320 $aIncludes bibliographical references and index. 327 $aInvited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy. 330 $aThis book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016. The 10 revised full papers and three short papers presented together with two invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on invited speeches; attacks on data security systems; detection of attacks on data security systems; data security; data privacy. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v651 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aData and Information Security 606 $aCryptology 606 $aAlgorithms 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aAlgorithms. 676 $a005.8 702 $aBatten$b Lynn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Gang$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254987403321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA