Normal view MARC view ISBD view

Secure IT Systems [electronic resource] : 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings / edited by Billy Bob Brumley, Juha Röning.

Contributor(s): Brumley, Billy Bob [editor.] | Röning, Juha [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 10014Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016.Description: X, 269 p. 43 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319475608.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Biometric identification | Algorithms | Computers and civilization | Data and Information Security | Cryptology | Biometrics | Algorithms | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Security -- System Security -- Network Security -- Software Security -- Cryptography -- Authentication.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016. The 16 full papers presented in this volume were carefully reviewed and selected from 43 submissions. The focus of the conference is on following topics: Security, System Security, Network Security, Software Security, and Information Security.<data security, mobile="" security, security="" protocols, risk="" management, security="" models,="" and vulnerability="" management.
    average rating: 0.0 (0 votes)
No physical items for this record

Security -- System Security -- Network Security -- Software Security -- Cryptography -- Authentication.

This book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016. The 16 full papers presented in this volume were carefully reviewed and selected from 43 submissions. The focus of the conference is on following topics: Security, System Security, Network Security, Software Security, and Information Security.<data security, mobile="" security, security="" protocols, risk="" management, security="" models,="" and vulnerability="" management.

There are no comments for this item.

Log in to your account to post a comment.