LEADER 04963nam 22008295 450 001 996465301903316 005 20200630231427.0 010 $a3-642-34210-8 024 7 $a10.1007/978-3-642-34210-3 035 $a(CKB)3280000000002206 035 $a(SSID)ssj0000788976 035 $a(PQKBManifestationID)11449503 035 $a(PQKBTitleCode)TC0000788976 035 $a(PQKBWorkID)10722039 035 $a(PQKB)10973027 035 $a(DE-He213)978-3-642-34210-3 035 $a(MiAaPQ)EBC3070448 035 $a(PPN)168326426 035 $a(EXLCZ)993280000000002206 100 $a20121026d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecure IT Systems$b[electronic resource] $e17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 -- November 2, 2012, Proceedings /$fedited by Audun Jøsang, Bengt Carlsson 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (X, 247 p. 62 illus.) 225 1 $aSecurity and Cryptology ;$v7617 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-34209-4 327 $aDesigned to Fail: A USB-Connected Reader for Online Banking -- Security Add-Ons for Mobile Platforms -- THAPS: Automated Vulnerability Scanning of PHP Applications -- Cyber security exercises and competitions as a platform for cyber security experiments -- The Development of Cyber Security Warning, Advice & Report Points -- Towards an Empirical Examination of IT Security Infrastructures in SME -- How to Select a Security Requirements Method? A comparative study with students and practitioners -- There is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication -- Coinductive Unwinding of Security-Relevant -- Retooling and Securing Systemic Debugging -- Cracking Associative Passwords -- A Hybrid Approach for Highly Available & Secure Storage of Pseudo-SSO Credentials -- Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links -- Everything but the Kitchen Sink: Determining the effect of multiple attacks on privacy preserving technology users -- Can We Identify Manipulative Behavior and the Corresponding Suspects on Review Websites using Supervised Learning? -- Privacy-Friendly Cloud Storage for the Data Track. 330 $aThis book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers are organized in topical sections on application security, security management, system security, network security, and trust management. 410 0$aSecurity and Cryptology ;$v7617 606 $aComputer security 606 $aData structures (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aData encryption (Computer science) 606 $aApplication software 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 608 $aConference proceedings.$2fast 615 0$aComputer security. 615 0$aData structures (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aData Structures and Information Theory. 615 24$aCoding and Information Theory. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aManagement of Computing and Information Systems. 676 $aa005.8 702 $aJøsang$b Audun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCarlsson$b Bengt$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aNordic Conference on Secure IT Systems 906 $aBOOK 912 $a996465301903316 996 $aSecure IT systems$91897185 997 $aUNISA