This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.
This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.
Produktdetails
Produktdetails
Communications in Computer and Information Science 1338
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices.- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme.- Digital Forensics for Drones: A Study of Tools and Techniques.- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output.- A New Rabin-type Cryptosystem with Modulus P^2q.- Malware Analysis Method Based Random Access Memory in Android.- Vulnerability Database as a Service for IoT.- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher.
A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices.- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme.- Digital Forensics for Drones: A Study of Tools and Techniques.- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output.- A New Rabin-type Cryptosystem with Modulus P^2q.- Malware Analysis Method Based Random Access Memory in Android.- Vulnerability Database as a Service for IoT.- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826