03979nam 22007935 450 99646568570331620200704190523.03-642-27937-610.1007/978-3-642-27937-9(CKB)3360000000365849(SSID)ssj0000666159(PQKBManifestationID)11367682(PQKBTitleCode)TC0000666159(PQKBWorkID)10665800(PQKB)10630954(DE-He213)978-3-642-27937-9(MiAaPQ)EBC3069959(PPN)168311224(EXLCZ)99336000000036584920120424d2012 u| 0engurnn#008mamaatxtccrInformation Security Technology for Applications[electronic resource] 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers /edited by Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg1st ed. 2012.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2012.1 online resource (X, 289 p. 73 illus.)Security and Cryptology ;7127Bibliographic Level Mode of Issuance: Monograph3-642-27936-8 Includes bibliographical references and index.This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.Security and Cryptology ;7127Computer securityData structures (Computer science)Coding theoryInformation theoryData encryption (Computer science)Application softwareE-commerceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040e-Commerce/e-businesshttps://scigraph.springernature.com/ontologies/product-market-codes/I26000Computer security.Data structures (Computer science).Coding theory.Information theory.Data encryption (Computer science).Application software.E-commerce.Systems and Data Security.Data Structures and Information Theory.Coding and Information Theory.Cryptology.Information Systems Applications (incl. Internet).e-Commerce/e-business.005.8Aura Tuomasedthttp://id.loc.gov/vocabulary/relators/edtJärvinen Kimmoedthttp://id.loc.gov/vocabulary/relators/edtNyberg Kaisaedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465685703316Information Security Technology for Applications2831137UNISA