Secure IT Systems

20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedings

  • Sonja Buchegger
  • Mads Dam
Conference proceedings

DOI: 10.1007/978-3-319-26502-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9417)

Table of contents

  1. Front Matter
  2. Cyber-Physical Systems Security

    1. Front Matter
      Pages 1-1
    2. Hannes Holm, Martin Karresand, Arne Vidström, Erik Westring
      Pages 11-26
    3. Martin Leth Pedersen, Michael Hedegaard Sørensen, Daniel Lux, Ulrik Nyman, René Rydhof Hansen
      Pages 27-43
  3. Privacy

    1. Front Matter
      Pages 45-45
    2. Hongyu Jin, Panos Papadimitratos
      Pages 47-63
    3. Benjamin Greschbach, Guillermo Rodríguez-Cano, Tomas Ericsson, Sonja Buchegger
      Pages 64-71
    4. Daniel Bosk, Martin Kjellqvist, Sonja Buchegger
      Pages 72-87
  4. Cryptography

    1. Front Matter
      Pages 89-89
    2. Billy Bob Brumley
      Pages 91-105
    3. Markku-Juhani O. Saarinen, Billy Bob Brumley
      Pages 106-122
  5. Trust and Fraud

    1. Front Matter
      Pages 137-137
    2. Ijlal Loutfi, Audun Jøsang
      Pages 139-155
    3. Edgar Alonso Lopez-Rojas, Stefan Axelsson
      Pages 156-171
  6. Network and Software Security

    1. Front Matter
      Pages 189-189
    2. Artem Voronkov, Stefan Lindskog, Leonardo A. Martucci
      Pages 191-196
    3. Bernd Jäger, Christian Röpke, Iris Adam, Thorsten Holz
      Pages 197-204

About these proceedings

Introduction

This book constitutes the proceedings of the 20th Nordic Conference on Secure IT Systems, held in Stockholm, Sweden, in October 2015.

The 11 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 38 submissions. They are organized in topical sections named: cyber-physical systems security, privacy, cryptography, trust and fraud, and network and software security.

Keywords

Cryptography Network security Software security Systems Security Trust Authentication Biometrics Cloud Computing Cyber-physical Systems Security Distributed Systems Fraud Information Security Intrusion Detection Network Security Privacy Security Security and Privacy Security Protocols Security Services Systems Security

Editors and affiliations

  • Sonja Buchegger
    • 1
  • Mads Dam
    • 1
  1. 1.KTH Royal Institute of Technology StockholmSweden

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-26501-8
  • Online ISBN 978-3-319-26502-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349