Advertisement

Applications and Techniques in Information Security

8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

  • Lynn Batten
  • Dong Seong Kim
  • Xuyun Zhang
  • Gang Li

Part of the Communications in Computer and Information Science book series (CCIS, volume 719)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Crypto Algorithms and Applications

    1. Front Matter
      Pages 1-1
    2. Michal Kedziora, Yang-Wai Chow, Willy Susilo
      Pages 3-13
    3. Praveen Gauravaram, Shoichi Hirose, Douglas Stebila
      Pages 14-22
    4. Mohammad Hossein Yalame, Mohammad Hossein Farzam, Siavash Bayat-Sarmadi
      Pages 23-34
    5. S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
      Pages 35-47
    6. Sourya Kakarla, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury
      Pages 58-72
  3. Privacy Preserving Techniques

    1. Front Matter
      Pages 73-73
    2. Kaleb L. Leemaqz, Sharon X. Lee, Geoffrey J. McLachlan
      Pages 75-87
    3. Sibghat Ullah Bazai, Julian Jang-Jaccard, Xuyun Zhang
      Pages 88-99
    4. Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
      Pages 100-110
  4. Attacks

    1. Front Matter
      Pages 111-111
    2. Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
      Pages 113-127
    3. Takeru Koie, Takanori Isobe, Yosuke Todo, Masakatu Morii
      Pages 128-140
    4. Tetiana Yarygina
      Pages 141-153
  5. Malware and Malicious Events Detection

    1. Front Matter
      Pages 155-155
    2. Ruibin Zhang, Chi Yang, Shaoning Pang, Hossein Sarrafzadeh
      Pages 157-168
    3. Naqqash Aman, Yasir Saleem, Fahim H. Abbasi, Farrukh Shahzad
      Pages 169-180
    4. Muhamed Fauzi Bin Abbas, Thambipillai Srikanthan
      Pages 181-189
  6. System and Network Security

    1. Front Matter
      Pages 191-191
    2. Xiang Tian, Yu Wang, Yujia Zhu, Yong Sun, Qingyun Liu
      Pages 193-200
    3. Sang Guun Yoo, Jhonattan J. Barriga
      Pages 201-213
  7. Back Matter
    Pages 223-223

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. 
The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. 
The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.

Keywords

Security protocols Mobile and wireless security Cryptograph Encryption Network security Cloud security Data security Privacy Forensics Security attack Attack detection

Editors and affiliations

  1. 1.School of Information TechnologyDeakin UniversityGeelongAustralia
  2. 2.University of CanterburyChristchurchNew Zealand
  3. 3.The University of AucklandAucklandNew Zealand
  4. 4.Deakin UniversityGeelongAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-10-5421-1
  • Copyright Information Springer Nature Singapore Pte Ltd. 2017
  • Publisher Name Springer, Singapore
  • eBook Packages Computer Science
  • Print ISBN 978-981-10-5420-4
  • Online ISBN 978-981-10-5421-1
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering