Secure IT Systems 26th Nordic Conference, NordSec 2021, Virtual Event, November 29-30, 2021, Proceedings / [electronic resource] :
edited by Nicola Tuveri, Antonis Michalas, Billy Bob Brumley.
- 1st ed. 2021.
- XII, 213 p. 47 illus., 41 illus. in color. online resource.
- Security and Cryptology, 13115 2946-1863 ; .
- Security and Cryptology, 13115 .
Applied Cryptography -- Security in Internet of Things -- Machine Learning and Security -- Network Security -- Trust.
This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021. The 11 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: Applied Cryptography, Security in Internet of Things, Machine Learning and Security, Network Security, and Trust.
9783030916251
10.1007/978-3-030-91625-1 doi
Data protection.
Application software.
Computer networks .
Computer networks--Security measures.
Cryptography.
Data encryption (Computer science).
Software engineering.
Data and Information Security.
Computer and Information Systems Applications.
Computer Communication Networks.
Mobile and Network Security.
Cryptology.
Software Engineering.
QA76.9.A25
005.8
Applied Cryptography -- Security in Internet of Things -- Machine Learning and Security -- Network Security -- Trust.
This book constitutes the refereed proceedings of the 26th Nordic Conference on Secure IT Systems, NordSec 2021, which was held online during November 2021. The 11 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: Applied Cryptography, Security in Internet of Things, Machine Learning and Security, Network Security, and Trust.
9783030916251
10.1007/978-3-030-91625-1 doi
Data protection.
Application software.
Computer networks .
Computer networks--Security measures.
Cryptography.
Data encryption (Computer science).
Software engineering.
Data and Information Security.
Computer and Information Systems Applications.
Computer Communication Networks.
Mobile and Network Security.
Cryptology.
Software Engineering.
QA76.9.A25
005.8