ICT Systems Security and Privacy Protection

32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book ICT Systems Security and Privacy Protection by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319584690
Publisher: Springer International Publishing Publication: May 17, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319584690
Publisher: Springer International Publishing
Publication: May 17, 2017
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017.

The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017.

The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.

More books from Springer International Publishing

Cover of the book Ontology-based Procedural Modelling of Traversable Buildings Composed by Arbitrary Shapes by
Cover of the book Scandinavian Civil Society and Social Transformations by
Cover of the book Industrial Engineering in the Big Data Era by
Cover of the book Pseudomonas: Molecular and Applied Biology by
Cover of the book Euro-Par 2017: Parallel Processing by
Cover of the book Nutritional Management of Inflammatory Bowel Diseases by
Cover of the book Competence Based Education and Training (CBET) and the End of Human Learning by
Cover of the book Applications in Electronics Pervading Industry, Environment and Society by
Cover of the book Sustainable Entrepreneurship by
Cover of the book Advances in Artificial Intelligence and Its Applications by
Cover of the book The International Court of Justice by
Cover of the book Evolution of Magmatic and Diamond-Forming Systems of the Earth's Lower Mantle by
Cover of the book Perturbed Gradient Flow Trees and A∞-algebra Structures in Morse Cohomology by
Cover of the book The Biosphere and Civilization: In the Throes of a Global Crisis by
Cover of the book Global Knowledge Dynamics and Social Technology by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy