LEADER 02958nam 22006855 450 001 9910298977603321 005 20251226202922.0 010 $a3-662-45670-2 024 7 $a10.1007/978-3-662-45670-5 035 $a(CKB)3710000000306320 035 $a(SSID)ssj0001386048 035 $a(PQKBManifestationID)11746788 035 $a(PQKBTitleCode)TC0001386048 035 $a(PQKBWorkID)11349333 035 $a(PQKB)10091099 035 $a(DE-He213)978-3-662-45670-5 035 $a(MiAaPQ)EBC6306751 035 $a(MiAaPQ)EBC5584864 035 $a(Au-PeEL)EBL5584864 035 $a(OCoLC)1066178644 035 $a(PPN)183097467 035 $a(EXLCZ)993710000000306320 100 $a20141113d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aApplications and Techniques in Information Security $eInternational Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings /$fedited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 266 p. 120 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v490 300 $aIncludes index. 311 08$a3-662-45669-9 327 $aApplications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations. 330 $aThis book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v490 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aCryptology 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aCryptology. 676 $a005.8 702 $aBatten$b Lynn$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Gang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNiu$b Wenjia$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWarren$b Matthew$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298977603321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA