
Future Challenges in Security and Privacy for Academia and Industry
26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings
Autoren
Parameter
Mehr zum Buch
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.
Buchkauf
Future Challenges in Security and Privacy for Academia and Industry, Jan Camenisch
- Sprache
- Erscheinungsdatum
- 2013
Lieferung
Zahlungsmethoden
Feedback senden
- Titel
- Future Challenges in Security and Privacy for Academia and Industry
- Untertitel
- 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings
- Sprache
- Englisch
- Autor*innen
- Jan Camenisch
- Verlag
- Springer Berlin
- Erscheinungsdatum
- 2013
- ISBN10
- 3642268331
- ISBN13
- 9783642268335
- Kategorie
- Informatik & Programmierung
- Beschreibung
- This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.