Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings /
Secure IT Systems 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16–17, 2023, Proceedings / [electronic resource] :
edited by Lothar Fritsch, Ismail Hassan, Ebenezer Paintsil.
- 1st ed. 2024.
- XII, 352 p. 93 illus., 71 illus. in color. online resource.
- Lecture Notes in Computer Science, 14324 1611-3349 ; .
- Lecture Notes in Computer Science, 14324 .
Privacy and data protection -- Cryptography, protocols, analysis -- Cyber security -- Aspects of trust -- Defenses and forensics -- Machine learning and artificial intelligence in information security.
This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16–17, 2023. The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.
9783031477485
10.1007/978-3-031-47748-5 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Database management.
Application software.
Computer networks .
Data and Information Security.
Cryptology.
Mobile and Network Security.
Database Management System.
Computer and Information Systems Applications.
Computer Communication Networks.
QA76.9.A25
005.8
Privacy and data protection -- Cryptography, protocols, analysis -- Cyber security -- Aspects of trust -- Defenses and forensics -- Machine learning and artificial intelligence in information security.
This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16–17, 2023. The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.
9783031477485
10.1007/978-3-031-47748-5 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Database management.
Application software.
Computer networks .
Data and Information Security.
Cryptology.
Mobile and Network Security.
Database Management System.
Computer and Information Systems Applications.
Computer Communication Networks.
QA76.9.A25
005.8