Secure IT Systems [electronic resource] : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius.
Material type: TextSeries: Security and Cryptology ; 10674Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017Description: XVIII, 313 p. 77 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319702902Subject(s): Computer security | Data encryption (Computer science) | Application software | Data mining | Computers and civilization | Computer organization | Systems and Data Security | Cryptology | Information Systems Applications (incl. Internet) | Data Mining and Knowledge Discovery | Computers and Society | Computer Systems Organization and Communication NetworksDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online Summary: This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
e-Books | Central Library, Sikkim University | 005.8 (Browse shelf(Opens below)) | Not for loan | E-3107 |
This book constitutes the proceedings of the 22nd Nordic Conference on Secure IT Systems, held in Tartu, Estonia, in November 2017. The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.
There are no comments on this title.