Advertisement

Applications and Techniques in Information Security

6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

  • Wenjia Niu
  • Gang Li
  • Jiqiang Liu
  • Jianlong Tan
  • Li Guo
  • Zhen Han
  • Lynn Batten

Part of the Communications in Computer and Information Science book series (CCIS, volume 557)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Cryptograph

    1. Front Matter
      Pages 1-1
    2. Yuzhen Li, Xiaodong Li, Xin Jin, Geng Zhao, Shiming Ge, Yulu Tian et al.
      Pages 3-13
    3. M. Amain, L. M. Batten
      Pages 27-35
    4. Ke Yuan, Nan Shen, Yonghang Yan, Zheli Liu, Chufu Jia
      Pages 65-73
    5. Xin Jin, Yingya Chen, Shiming Ge, Kejun Zhang, Xiaodong Li, Yuzhen Li et al.
      Pages 74-85
  3. Evaluation, Standards and Protocols

    1. Front Matter
      Pages 87-87
    2. Quan Bai, Gang Xiong, Yong Zhao, Zhenzhen Li
      Pages 89-100
    3. Zhuohua Liu, Wei Zhang, Chuankun Wu
      Pages 114-128
    4. Fan Yang, Yulan Zheng, Ping Xiong
      Pages 129-137
  4. Trust Computing and Privacy Protection

    1. Front Matter
      Pages 139-139
    2. Wenpeng Liu, Yanan Cao, Diying Li, Wenjia Niu, Jianlong Tan, Yue Hu et al.
      Pages 141-152
    3. Lefeng Zhang, Xiaodan Lu, Ping Xiong, Tianqing Zhu
      Pages 153-164
    4. Haiyang He, Yong Wang, Guoyong Cai
      Pages 177-188
    5. Guoyong Cai, Liyuan Wang, Haiyang He
      Pages 189-200
  5. Cloud Security and Applications

    1. Front Matter
      Pages 201-201
    2. Baohui Li, Wenjia Niu, Kefu Xu, Chuang Zhang, Peng Zhang
      Pages 203-214
    3. Xinlong Zhao, Weishi Zhang, Wei Ma
      Pages 215-225
    4. Na Pang, Dali Zhu, Zheming Fan, Wenjing Rong, Weimiao Feng
      Pages 226-237
    5. Li Lu, Zhen Han, Zhi Chen
      Pages 245-251
  6. Tools and Methodologies

    1. Front Matter
      Pages 253-253
    2. Qiu Tang, Lei Jiang, Qiong Dai, Majing Su, Hongtao Xie
      Pages 255-268
    3. Yang Pu, Xiaojun Chen, Yiguo Pu, JinQiao Shi
      Pages 269-279
    4. Hongzhou Li, Fei Chen, Zhaojun Yang, Yingnan Kan, Liding Wang
      Pages 291-302
    5. Cuiwen Xiong, Pengxiao Li, Peng Zhang, Qingyun Liu, Jianlong Tan
      Pages 303-314
    6. Qian Wang, Wei Xiong, Ya Shuang Deng
      Pages 326-336
    7. Hao Li, Zewu Peng, Xinyao Feng, Hongxia Ma
      Pages 337-343
  7. System Design and Implementations

    1. Front Matter
      Pages 345-345
    2. Guangyu Gu, Shujuan Zhang, Xuefei Wang, Xiang Cai, Sheng Chen
      Pages 359-367
    3. Hong Zou, Yang Qian, Yanshuai Zhao, Kun Ding
      Pages 368-378
    4. Zewu Peng, Xinyao Feng, Liangliang Tang, Meijie Zhai
      Pages 379-386
    5. Minghai Shao, Yingding Zhao, Jianlong Tan
      Pages 387-396
  8. Back Matter
    Pages 397-398

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. 
The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Keywords

Cryptograph Encryption Network security Cloud security Data security Privacy Forensics

Editors and affiliations

  • Wenjia Niu
    • 1
  • Gang Li
    • 2
  • Jiqiang Liu
    • 3
  • Jianlong Tan
    • 4
  • Li Guo
    • 5
  • Zhen Han
    • 6
  • Lynn Batten
    • 7
  1. 1.Chinese Academy of SciencesBeijingChina
  2. 2.Deakin UniversityBurwoodAustralia
  3. 3.Beijing Jiaotong UniversityBeijingChina
  4. 4.Chinese Academy of SciencesBeijingChina
  5. 5.Chinese Academy of SciencesBeijingChina
  6. 6.Beijing Jiaotong UniversityBeijingChina
  7. 7.Fac. Science&TechnologyDeakin UniversityBurwoodAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-48683-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-48682-5
  • Online ISBN 978-3-662-48683-2
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering