LEADER 03905nam 22007935 450 001 996465993803316 005 20200704155304.0 010 $a3-642-29615-7 024 7 $a10.1007/978-3-642-29615-4 035 $a(CKB)3360000000366023 035 $a(SSID)ssj0000851099 035 $a(PQKBManifestationID)11966590 035 $a(PQKBTitleCode)TC0000851099 035 $a(PQKBWorkID)10847637 035 $a(PQKB)10655613 035 $a(DE-He213)978-3-642-29615-4 035 $a(MiAaPQ)EBC3070576 035 $a(PPN)168314940 035 $a(EXLCZ)993360000000366023 100 $a20120423d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Technology for Applications$b[electronic resource] $e16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers /$fedited by Peeter Laud 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (X, 273 p. 84 illus.) 225 1 $aSecurity and Cryptology ;$v7161 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-29614-9 320 $aIncludes bibliographical references and author index. 330 $aThis book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware. 410 0$aSecurity and Cryptology ;$v7161 606 $aComputer security 606 $aData structures (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aData encryption (Computer science) 606 $aApplication software 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData structures (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aData Structures and Information Theory. 615 24$aCoding and Information Theory. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aLaud$b Peeter$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465993803316 996 $aInformation Security Technology for Applications$92831137 997 $aUNISA