Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers / [electronic resource] : edited by Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg. - Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. - X, 289 p. 73 illus. online resource. - Lecture Notes in Computer Science, 7127 0302-9743 ; . - Lecture Notes in Computer Science, 7127 .

This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.

9783642279379

10.1007/978-3-642-27937-9 doi


Computer science.
Data protection.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer Science.
Systems and Data Security.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Data Encryption.
Information Systems Applications (incl. Internet).
e-Commerce/e-business.

QA76.9.A25

005.8
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha