LEADER 03505nam 22007215 450 001 9910427694603321 005 20251225185135.0 010 $a981-334-706-6 024 7 $a10.1007/978-981-33-4706-9 035 $a(OCoLC)1238200339 035 $a(CKB)5280000000246084 035 $a(MiAaPQ)EBC6417072 035 $a(DE-He213)978-981-33-4706-9 035 $a(PPN)252504240 035 $a(EXLCZ)995280000000246084 100 $a20201130d2020 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplications and Techniques in Information Security $e11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12?13, 2020, Proceedings /$fedited by Lejla Batina, Gang Li 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (IX, 123 p. 33 illus., 21 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1338 300 $aIncludes index. 311 08$a981-334-705-8 327 $aA Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. . 330 $aThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1338 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aMobile and Network Security 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 676 $a929.605 702 $aLi$b Gang 702 $aBatina$b Lejla 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910427694603321 996 $aApplications and Techniques in Information Security$92028776 997 $aUNINA