presented at event International Conference on Applications and Techniques in Information Security Conference