Advertisement

© 2015

Applications and Techniques in Information Security

6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings

  • Wenjia Niu
  • Gang Li
  • Jiqiang Liu
  • Jianlong Tan
  • Li Guo
  • Zhen Han
  • Lynn Batten
Conference proceedings ATIS 2015

Part of the Communications in Computer and Information Science book series (CCIS, volume 557)

Table of contents

  1. Front Matter
    Pages I-XVII
  2. Cryptograph

    1. Front Matter
      Pages 1-1
    2. Yuzhen Li, Xiaodong Li, Xin Jin, Geng Zhao, Shiming Ge, Yulu Tian et al.
      Pages 3-13
    3. M. Amain, L. M. Batten
      Pages 27-35
    4. Ke Yuan, Nan Shen, Yonghang Yan, Zheli Liu, Chufu Jia
      Pages 65-73
    5. Xin Jin, Yingya Chen, Shiming Ge, Kejun Zhang, Xiaodong Li, Yuzhen Li et al.
      Pages 74-85
  3. Evaluation, Standards and Protocols

    1. Front Matter
      Pages 87-87
    2. Quan Bai, Gang Xiong, Yong Zhao, Zhenzhen Li
      Pages 89-100
    3. Zhuohua Liu, Wei Zhang, Chuankun Wu
      Pages 114-128
    4. Fan Yang, Yulan Zheng, Ping Xiong
      Pages 129-137
  4. Trust Computing and Privacy Protection

    1. Front Matter
      Pages 139-139
    2. Wenpeng Liu, Yanan Cao, Diying Li, Wenjia Niu, Jianlong Tan, Yue Hu et al.
      Pages 141-152
    3. Lefeng Zhang, Xiaodan Lu, Ping Xiong, Tianqing Zhu
      Pages 153-164
    4. Haiyang He, Yong Wang, Guoyong Cai
      Pages 177-188

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. 
The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Keywords

Cryptograph Encryption Network security Cloud security Data security Privacy Forensics

Editors and affiliations

  • Wenjia Niu
    • 1
  • Gang Li
    • 2
  • Jiqiang Liu
    • 3
  • Jianlong Tan
    • 4
  • Li Guo
    • 5
  • Zhen Han
    • 6
  • Lynn Batten
    • 7
  1. 1.Chinese Academy of SciencesBeijingChina
  2. 2.Deakin UniversityBurwoodAustralia
  3. 3.Beijing Jiaotong UniversityBeijingChina
  4. 4.Chinese Academy of SciencesBeijingChina
  5. 5.Chinese Academy of SciencesBeijingChina
  6. 6.Beijing Jiaotong UniversityBeijingChina
  7. 7.Fac. Science&TechnologyDeakin UniversityBurwoodAustralia

Bibliographic information

  • Book Title Applications and Techniques in Information Security
  • Book Subtitle 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings
  • Editors Wenjia Niu
    Gang Li
    Jiqiang Liu
    Jianlong Tan
    Li Guo
    Zhen Han
    Lynn Batten
  • Series Title Communications in Computer and Information Science
  • Series Abbreviated Title Communic.Comp.Inf.Science
  • DOI https://doi.org/10.1007/978-3-662-48683-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-662-48682-5
  • eBook ISBN 978-3-662-48683-2
  • Series ISSN 1865-0929
  • Series E-ISSN 1865-0937
  • Edition Number 1
  • Number of Pages XVII, 398
  • Number of Illustrations 0 b/w illustrations, 147 illustrations in colour
  • Topics Systems and Data Security
    Cryptology
    Algorithm Analysis and Problem Complexity
  • Buy this book on publisher's site