Abbrevation
ATIS
City
Auckland
Country
New Zealand
Deadline Paper
Start Date
End Date
Abstract

The 2017 International Conference on Applications and Technologies in Information Security (ATIS), will be the eighth event in the ATIS series, which started in 2010&#046;<br>As academic research in information security has developed over the last twenty or so years, applications and techniques are being developed to be of specific use in this area&#046;<br>These include wavelets and their applications in digital forensics, classification algorithms for use in malicious software detection, and genetic algorithms custom&#8211;made for the cryptographic community, etc&#046;<br>ATIS 2017 focuses on all aspects on techniques and applications in information security&#046;<br>Papers are invited in the areas below, but do not exclude research in the general areas of the topic headings&#046;<br>Topics of interest include (but not limited to):<br>Attacks against Implementations<br>&#8211; Digital Forensics<br>&#8211; Key Recovery<br>&#8211; Hacking<br>&#8211; Reverse Engineering<br>Data Privacy<br>&#8211; Privacy Protection<br>&#8211; Smart device information leaks<br>&#8211; Trusted and Trustworthy Computing<br>&#8211; Privacy Preservation in Data Release<br>Evaluation, standards and protocols<br>&#8211; Domain name server security<br>&#8211; Transport Layer Security<br>&#8211; Risk Evaluation and Security Certification<br>&#8211; Security Management<br>Security Implementations<br>&#8211; Access Control<br>&#8211; Authentication and Authorization<br>&#8211; Data and System Integrity<br>&#8211; Database Security<br>&#8211; Distributed Systems Security<br>&#8211; Information Hiding and Watermarking Intellectual Property Protection<br>&#8211; Operating System Security<br>&#8211; Intellectual Property Protection<br>&#8211; Key Management<br>Tools and Methodologies<br>&#8211; Evaluation of Security<br>&#8211; Evaluation of Security Tools<br>&#8211; Development of Security Tools<br>Various Applications<br>&#8211; Electronic Commerce Security<br>&#8211; Cloud Security<br>&#8211; Software Defined Networking<br>&#8211; Digital Forensics<br>&#8211; Internet of Things<br>&#8211; Smartphone Security<br>&#8211; Language&#8211;based Security<br>&#8211; Sustainable Practice<br>&#8211; Numerical Modelling<br>Vulnerabilities<br>&#8211; Digital Forensics<br>&#8211; Intrusion Detection<br>&#8211; Malicious software<br>