Secure IT systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings /
Secure IT systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings /
NordSec 2017
Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius (eds.).
- 1 online resource (xviii, 313 pages) : illustrations
- Lecture notes in computer science, 10674 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology .
- Lecture notes in computer science ; 10674. LNCS sublibrary. SL 4, Security and cryptology. .
International conference proceedings.
Includes bibliographical references and author index.
This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.
9783319702902 3319702904
10.1007/978-3-319-70290-2 doi
com.springer.onix.9783319702902 Springer Nature
GBB8M3556 bnb
019137935 Uk
Computer security--Congresses.
Sécurité informatique--Congrès.
Coding theory & cryptology.
Information retrieval.
Data mining.
Ethical & social aspects of IT.
Computer networking & communications.
Computer security.
Computers--Security--General.
Computers--Information Technology.
Computers--Database Management--Data Mining.
Computers--Social Aspects--General.
Computers--Hardware--General.
Computer security
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25
005.8
International conference proceedings.
Includes bibliographical references and author index.
This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.
9783319702902 3319702904
10.1007/978-3-319-70290-2 doi
com.springer.onix.9783319702902 Springer Nature
GBB8M3556 bnb
019137935 Uk
Computer security--Congresses.
Sécurité informatique--Congrès.
Coding theory & cryptology.
Information retrieval.
Data mining.
Ethical & social aspects of IT.
Computer networking & communications.
Computer security.
Computers--Security--General.
Computers--Information Technology.
Computers--Database Management--Data Mining.
Computers--Social Aspects--General.
Computers--Hardware--General.
Computer security
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25
005.8