© 2017

Applications and Techniques in Information Security

8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

  • Lynn Batten
  • Dong Seong Kim
  • Xuyun Zhang
  • Gang Li
Conference proceedings ATIS 2017

Part of the Communications in Computer and Information Science book series (CCIS, volume 719)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Crypto Algorithms and Applications

    1. Front Matter
      Pages 1-1
    2. Michal Kedziora, Yang-Wai Chow, Willy Susilo
      Pages 3-13
    3. Praveen Gauravaram, Shoichi Hirose, Douglas Stebila
      Pages 14-22
    4. Mohammad Hossein Yalame, Mohammad Hossein Farzam, Siavash Bayat-Sarmadi
      Pages 23-34
    5. S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan
      Pages 35-47
    6. Sourya Kakarla, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury
      Pages 58-72
  3. Privacy Preserving Techniques

    1. Front Matter
      Pages 73-73
    2. Kaleb L. Leemaqz, Sharon X. Lee, Geoffrey J. McLachlan
      Pages 75-87
    3. Sibghat Ullah Bazai, Julian Jang-Jaccard, Xuyun Zhang
      Pages 88-99
    4. Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai
      Pages 100-110
  4. Attacks

    1. Front Matter
      Pages 111-111
    2. Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori
      Pages 113-127
    3. Takeru Koie, Takanori Isobe, Yosuke Todo, Masakatu Morii
      Pages 128-140
    4. Tetiana Yarygina
      Pages 141-153
  5. Malware and Malicious Events Detection

    1. Front Matter
      Pages 155-155
    2. Ruibin Zhang, Chi Yang, Shaoning Pang, Hossein Sarrafzadeh
      Pages 157-168
    3. Naqqash Aman, Yasir Saleem, Fahim H. Abbasi, Farrukh Shahzad
      Pages 169-180
    4. Muhamed Fauzi Bin Abbas, Thambipillai Srikanthan
      Pages 181-189

About these proceedings


This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. 
The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. 
The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.


Security protocols Mobile and wireless security Cryptograph Encryption Network security Cloud security Data security Privacy Forensics Security attack Attack detection

Editors and affiliations

  1. 1.School of Information TechnologyDeakin UniversityGeelongAustralia
  2. 2.University of CanterburyChristchurchNew Zealand
  3. 3.The University of AucklandAucklandNew Zealand
  4. 4.Deakin UniversityGeelongAustralia

Bibliographic information

  • Book Title Applications and Techniques in Information Security
  • Book Subtitle 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings
  • Editors Lynn Batten
    Dong Seong Kim
    Xuyun Zhang
    Gang Li
  • Series Title Communications in Computer and Information Science
  • Series Abbreviated Title Communic.Comp.Inf.Science
  • DOI
  • Copyright Information Springer Nature Singapore Pte Ltd. 2017
  • Publisher Name Springer, Singapore
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-981-10-5420-4
  • eBook ISBN 978-981-10-5421-1
  • Series ISSN 1865-0929
  • Series E-ISSN 1865-0937
  • Edition Number 1
  • Number of Pages XIV, 223
  • Number of Illustrations 68 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
    Algorithm Analysis and Problem Complexity
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment