Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I / [electronic resource] :
edited by Simon N. Foley, Dieter Gollmann, Einar Snekkenes.
- 1st ed. 2017.
- XXI, 485 p. 106 illus. online resource.
- Security and Cryptology, 10492 2946-1863 ; .
- Security and Cryptology, 10492 .
Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
9783319664026
10.1007/978-3-319-66402-6 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Computers and civilization.
Computers--Law and legislation.
Information technology--Law and legislation.
Data and Information Security.
Cryptology.
IT Operations.
Algorithms.
Computers and Society.
Legal Aspects of Computing.
QA76.9.A25
005.8
Data protection -- Security protocols -- Systems -- Web and network security -- Privacy -- Threat modeling and detection -- Information flow -- Security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.
9783319664026
10.1007/978-3-319-66402-6 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Computers and civilization.
Computers--Law and legislation.
Information technology--Law and legislation.
Data and Information Security.
Cryptology.
IT Operations.
Algorithms.
Computers and Society.
Legal Aspects of Computing.
QA76.9.A25
005.8