Secure IT Systems [electronic resource] : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius.
Contributor(s): Lipmaa, Helger [editor.] | Mitrokotsa, Aikaterini [editor.] | Matulevičius, Raimundas [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 10674Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017.Description: XVIII, 313 p. 77 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319702902.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Application software | Data mining | Computers and civilization | Computer engineering | Computer networks | Data and Information Security | Cryptology | Computer and Information Systems Applications | Data Mining and Knowledge Discovery | Computers and Society | Computer Engineering and NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.No physical items for this record
This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.
There are no comments for this item.