Secure IT Systems [electronic resource] : 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings / edited by Sonja Buchegger, Mads Dam.
Contributor(s): Buchegger, Sonja [editor.]
| Dam, Mads [editor.]
| SpringerLink (Online service)
.
Material type: 











No physical items for this record
This book constitutes the proceedings of the 20th Nordic Conference on Secure IT Systems, held in Stockholm, Sweden, in October 2015. The 11 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 38 submissions. They are organized in topical sections named: cyber-physical systems security, privacy, cryptography, trust and fraud, and network and software security.
There are no comments for this item.