Amazon cover image
Image from Amazon.com

Applications and Techniques in Information Security [electronic resource] : 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings /

Contributor(s): Material type: TextTextSeries: Communications in Computer and Information Science ; 1116Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2019Edition: 1st ed. 2019Description: XI, 313 p. 157 illus., 101 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789811508714
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Information Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. .
In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications. .
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Information Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. .

This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications. .

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in