Information Security Technology for Applications 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers / [electronic resource] :
edited by Peeter Laud.
- 1st ed. 2012.
- X, 273 p. 84 illus. online resource.
- Security and Cryptology, 7161 2946-1863 ; .
- Security and Cryptology, 7161 .
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.
9783642296154
10.1007/978-3-642-29615-4 doi
Data protection.
Data structures (Computer science).
Information theory.
Coding theory.
Cryptography.
Data encryption (Computer science).
Application software.
Electronic data processing--Management.
Data and Information Security.
Data Structures and Information Theory.
Coding and Information Theory.
Cryptology.
Computer and Information Systems Applications.
IT Operations.
QA76.9.A25
005.8
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.
9783642296154
10.1007/978-3-642-29615-4 doi
Data protection.
Data structures (Computer science).
Information theory.
Coding theory.
Cryptography.
Data encryption (Computer science).
Application software.
Electronic data processing--Management.
Data and Information Security.
Data Structures and Information Theory.
Coding and Information Theory.
Cryptology.
Computer and Information Systems Applications.
IT Operations.
QA76.9.A25
005.8