↓ Skip to main content

Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

Overview of attention for book
Cover of 'Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems
  3. Altmetric Badge
    Chapter 2 Security Analysis of a Design Variant of Randomized Hashing
  4. Altmetric Badge
    Chapter 3 Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
  5. Altmetric Badge
    Chapter 4 An Efficient Non-transferable Proxy Re-encryption Scheme
  6. Altmetric Badge
    Chapter 5 Rounding Technique’s Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
  7. Altmetric Badge
    Chapter 6 On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES
  8. Altmetric Badge
    Chapter 7 Private Distributed Three-Party Learning of Gaussian Mixture Models
  9. Altmetric Badge
    Chapter 8 A Privacy Preserving Platform for MapReduce
  10. Altmetric Badge
    Chapter 9 Privacy-Preserving Deep Learning: Revisited and Enhanced
  11. Altmetric Badge
    Chapter 10 Characterizing Promotional Attacks in Mobile App Store
  12. Altmetric Badge
    Chapter 11 Low-Data Complexity Attacks on Camellia
  13. Altmetric Badge
    Chapter 12 RESTful Is Not Secure
  14. Altmetric Badge
    Chapter 13 UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space
  15. Altmetric Badge
    Chapter 14 A Hybrid Approach for Malware Family Classification
  16. Altmetric Badge
    Chapter 15 Low-Complexity Signature-Based Malware Detection for IoT Devices
  17. Altmetric Badge
    Chapter 16 De-anonymous and Anonymous Technologies for Network Traffic Release
  18. Altmetric Badge
    Chapter 17 Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
  19. Altmetric Badge
    Chapter 18 On the Effectiveness of Non-readable Executable Memory Against BROP
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
2 X users

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
15 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings
Published by
Springer, Singapore, January 2017
DOI 10.1007/978-981-10-5421-1
ISBNs
978-9-81-105420-4, 978-9-81-105421-1
Editors

Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 15 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 15 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 13%
Student > Master 1 7%
Unknown 12 80%
Readers by discipline Count As %
Computer Science 2 13%
Engineering 1 7%
Unknown 12 80%