Amazon cover image
Image from Amazon.com

Security and Trust Management [electronic resource] : 13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedings /

Contributor(s): Material type: TextTextSeries: Security and Cryptology ; 10547Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017Description: X, 235 p. 66 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319680637
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Cryptosystems and Applied Cryptography -- Software Security and Risk Management -- Authorization -- Security Vulnerabilities and Protocols -- Secure Systems.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. The 10 full papers and 6 short papers were carefully reviewed and selected from 33 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; software security and risk management; authorization; security vulnerabilities and protocols; and secure systems.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cryptosystems and Applied Cryptography -- Software Security and Risk Management -- Authorization -- Security Vulnerabilities and Protocols -- Secure Systems.

This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. The 10 full papers and 6 short papers were carefully reviewed and selected from 33 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; software security and risk management; authorization; security vulnerabilities and protocols; and secure systems.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in