Secure IT Systems [electronic resource] : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius.

Contributor(s): Lipmaa, Helger | Mitrokotsa, Aikaterini | Matulevičius, RaimundasMaterial type: TextTextSeries: Security and Cryptology ; 10674Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017Description: XVIII, 313 p. 77 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319702902Subject(s): Computer security | Data encryption (Computer science) | Application software | Data mining | Computers and civilization | Computer organization | Systems and Data Security | Cryptology | Information Systems Applications (incl. Internet) | Data Mining and Knowledge Discovery | Computers and Society | Computer Systems Organization and Communication NetworksDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online Summary: This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
e-Books e-Books Central Library, Sikkim University
005.8 (Browse shelf(Opens below)) Not for loan E-3107
Total holds: 0

This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.

There are no comments on this title.

to post a comment.
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha