Information security technology for applications [electronic resource] : 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised selected papers / Peeter Laud (ed.)

This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers ar...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: Nordic Conference on Secure IT Systems Tallinn, Estonia
Other Authors: Laud, Peeter
Other title:NordSec 2011.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2012.
Series:Lecture notes in computer science ; 7161.
LNCS sublibrary. Security and cryptology.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b7110835
006 m o d
007 cr |||||||||||
008 120507s2012 gw ob 101 0 eng d
005 20240418144327.6
019 |a 804921807 
020 |a 9783642296154  |q (electronic bk.) 
020 |a 3642296157  |q (electronic bk.) 
020 |a 3642296149 
020 |a 9783642296147 
020 |z 9783642296147 
024 7 |a 10.1007/978-3-642-29615-4 
035 |a (OCoLC)spr793202720 
035 |a (OCoLC)793202720  |z (OCoLC)804921807 
037 |a spr978-3-642-29615-4 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d COO  |d ZMC  |d OCLCQ  |d E7B  |d MEAUC  |d OCLCF  |d BEDGE  |d OCLCO  |d YDXCP  |d AU@  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCO  |d EBLCP  |d OCLCQ  |d ESU  |d OCLCQ  |d IOG  |d OCLCA  |d CEF  |d U3W  |d WYU  |d YOU  |d TKN  |d LEAUB  |d OCLCQ  |d AJS  |d OCLCQ  |d OCLCO 
049 |a GWRE 
050 4 |a QA76.9.A25  |b N67 2011 
111 2 |a Nordic Conference on Secure IT Systems  |n (16th :  |d 2011 :  |c Tallinn, Estonia) 
245 1 0 |a Information security technology for applications  |h [electronic resource] :  |b 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised selected papers /  |c Peeter Laud (ed.) 
246 3 |a NordSec 2011. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2012. 
300 |a 1 online resource (x, 271 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 7161. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
504 |a Includes bibliographical references and author index. 
505 0 0 |t Designing a Governmental Backbone /  |r Arne Ansper --  |t Internet Voting in Estonia /  |r Priit Vinkel --  |t A Ring Based Onion Circuit for Hidden Services /  |r Hakem Beitollahi and Geert Deconinck --  |t User Tracking on the Web via Cross-Browser Fingerprinting /  |r Károly Boda, Ádám Máté Földes, Gábor György Gulyás and Sándor Imre --  |t Comparison of SRAM and FF PUF in 65nm Technology /  |r Mathias Claes, Vincent van der Leest and An Braeken --  |t Modular Anomaly Detection for Smartphone Ad Hoc Communication /  |r Jordi Cucurull, Simin Nadjm-Tehrani and Massimiliano Raciti --  |t Mental Voting Booths /  |r Jérôme Dossogne and Frédéric Lafitte --  |t Methods for Privacy Protection Considering Status of Service Provider and User Community /  |r Kazutomo Hamamoto, Yasuyuki Tahara and Akihiko Ohsuga --  |t The Security and Memorability of Passwords Generated by Using an Association Element and a Personal Factor /  |r Kirsi Helkala and Nils Kalstad Svendsen. 
505 0 0 |t Increasing Service Users' Privacy Awareness by Introducing On-Line Interactive Privacy Features /  |r Elahe Kani-Zabihi and Martin Helmhout --  |t Optimized Inlining of Runtime Monitors /  |r Frédérick Lemay, Raphaël Khoury and Nadia Tawbi --  |t Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service /  |r Radu Lupu, Eugen Borcoci and Tinku Rasheed --  |t Feature Reduction to Speed Up Malware Classification /  |r Veelasha Moonsamy, Ronghua Tian and Lynn Batten --  |t Rooting Android -- Extending the ADB by an Auto-connecting WiFi-Accessible Service /  |r Assem Nazar, Mark M. Seeger and Harald Baier --  |t An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks /  |r Jaydip Sen and Subhamoy Maitra --  |t Disjunction Category Labels /  |r Deian Stefan, Alejandro Russo, David Mazières and John C. Mitchell --  |t Visualization Control for Event-Based Public Display Systems Used in a Hospital Setting /  |r Inger Anne Tøndel --  |t Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations /  |r Erich Wenger and Michael Hutter. 
520 |a This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware. 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458. 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Laud, Peeter.  |0 http://id.loc.gov/authorities/names/nb2012012745  |1 http://isni.org/isni/0000000459610364. 
776 0 8 |i Printed edition:  |z 9783642296147. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-29615-4  |z Full Text (via Springer) 
830 0 |a Lecture notes in computer science ;  |v 7161.  |0 http://id.loc.gov/authorities/names/n42015162. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology.  |0 http://id.loc.gov/authorities/names/no2007042442. 
907 |a .b7110835x  |b 04-01-21  |c 05-22-12 
915 |a - 
998 |a web  |b 03-31-21  |c b  |d b   |e -  |f eng  |g gw   |h 0  |i 1 
907 |a .b7110835x  |b 03-31-21  |c 05-22-12 
944 |a MARS - RDA ENRICHED 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
956 |a Springer e-books 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
999 f f |i 893e2b66-d205-5264-a565-f6106fb2304d  |s 89bbc271-c119-573c-a608-5266d0a6638b 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 N67 2011  |h Library of Congress classification  |i Ebooks, Prospector  |n 1