Overview
- Includes supplementary material: sn.pub/extras
- Includes supplementary material: sn.pub/extras
Part of the book series: IFIP Advances in Information and Communication Technology (IFIPAICT, volume 502)
Included in the following conference series:
Conference proceedings info: SEC 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (38 papers)
-
Network Security and Cyber Attacks
-
Security and Privacy in Social Applications and Cyber Attacks Defense
-
Private Queries and Aggregations
Other volumes
-
ICT Systems Security and Privacy Protection
Keywords
About this book
The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.
Editors and Affiliations
Bibliographic Information
Book Title: ICT Systems Security and Privacy Protection
Book Subtitle: 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings
Editors: Sabrina De Capitani di Vimercati, Fabio Martinelli
Series Title: IFIP Advances in Information and Communication Technology
DOI: https://doi.org/10.1007/978-3-319-58469-0
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: IFIP International Federation for Information Processing 2017
Hardcover ISBN: 978-3-319-58468-3Published: 04 May 2017
Softcover ISBN: 978-3-319-86414-3Published: 25 July 2018
eBook ISBN: 978-3-319-58469-0Published: 17 May 2017
Series ISSN: 1868-4238
Series E-ISSN: 1868-422X
Edition Number: 1
Number of Pages: XVI, 586
Number of Illustrations: 159 b/w illustrations
Topics: Systems and Data Security, Cryptology, Information Systems Applications (incl. Internet), Computers and Society, Legal Aspects of Computing, Computer Applications