Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers / [electronic resource] :
edited by Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg.
- 1st ed. 2012.
- X, 289 p. 73 illus. online resource.
- Security and Cryptology, 7127 2946-1863 ; .
- Security and Cryptology, 7127 .
This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.
9783642279379
10.1007/978-3-642-27937-9 doi
Data protection. Data structures (Computer science). Information theory. Coding theory. Cryptography. Data encryption (Computer science). Application software. Electronic commerce. Data and Information Security. Data Structures and Information Theory. Coding and Information Theory. Cryptology. Computer and Information Systems Applications. e-Commerce and e-Business.