Advertisement

Applications and Techniques in Information Security

9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings

  • Qingfeng Chen
  • Jia Wu
  • Shichao Zhang
  • Changan Yuan
  • Lynn Batten
  • Gang Li
Conference proceedings ATIS 2018

Part of the Communications in Computer and Information Science book series (CCIS, volume 950)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Information Security

    1. Front Matter
      Pages 1-1
    2. Bin Wang, Rong-yang Zhao, Guo-yin Zhang, Jia-Hai Liang
      Pages 3-11
    3. Krishna Prakasha, Pratheeksha Gowda, Vasundhara Acharya, Balachandra Muniyal, Mayank Khandelwal
      Pages 40-51
  3. Information Abuse Prevention

    1. Front Matter
      Pages 53-53
    2. M. J. Akshay, N. Ala Mohammed, Amit Vyas, Palayil Baby Shony, Sheldon Kevin Correa
      Pages 55-66
    3. Noora Alallaq, Muhmmad Al-khiza’ay, Mohammed Iqbal Dohan, Xin Han
      Pages 79-91
  4. Security Implementations

    1. Front Matter
      Pages 107-107
    2. Yong Huang, Yongsheng Li, Qinggeng Jin
      Pages 109-117
    3. Sucharitha Shetty, B. Dinesh Rao, Srikanth Prabhu
      Pages 129-135
  5. Knowledge Discovery

    1. Front Matter
      Pages 145-145
    2. Niharika Gupta, Vipul Mayank, M. Geetha, Shwetha Rai, Shyam Karanth
      Pages 172-182
  6. Applications

    1. Front Matter
      Pages 183-183
    2. Tianshi Liu, Qiong Wu, Wenjuan Zhang, Xinran Cao
      Pages 185-198
    3. Binayaka Chakraborty, M. Geetha
      Pages 208-214
    4. Diana Olivia, Ashalatha Nayak, Mamatha Balachandra
      Pages 215-221
  7. Back Matter
    Pages 223-223

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018.

The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.

Keywords

artificial intelligence association rules authentication cryptography data mining data privacy data security encryption genetic algorithms parallel processing systems privacy preserving privacy protection public key cryptography security systems social networks wireless sensor networks wireless telecommunication systems

Editors and affiliations

  1. 1.Guangxi UniversityNanningChina
  2. 2.Macquarie UniversitySydneyAustralia
  3. 3.Guangxi Normal UniversityNanningChina
  4. 4.Guangxi College of EducationNanningChina
  5. 5.Deakin UniversityGeelongAustralia
  6. 6.Deakin UniversityGeelongAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-13-2907-4
  • Copyright Information Springer Nature Singapore Pte Ltd. 2018
  • Publisher Name Springer, Singapore
  • eBook Packages Computer Science
  • Print ISBN 978-981-13-2906-7
  • Online ISBN 978-981-13-2907-4
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering