Skip to main content
  • Conference proceedings
  • © 2012

Information Security Technology for Applications

16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers

Editors:

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7161)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): NordSec: Nordic Conference on Secure IT Systems

Conference proceedings info: NordSec 2011.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Invited Papers

    1. Designing a Governmental Backbone

      • Arne Ansper
      Pages 1-3
    2. Internet Voting in Estonia

      • Priit Vinkel
      Pages 4-12
  3. Contributed Papers

    1. A Ring Based Onion Circuit for Hidden Services

      • Hakem Beitollahi, Geert Deconinck
      Pages 13-30
    2. User Tracking on the Web via Cross-Browser Fingerprinting

      • Károly Boda, Ádám Máté Földes, Gábor György Gulyás, Sándor Imre
      Pages 31-46
    3. Comparison of SRAM and FF PUF in 65nm Technology

      • Mathias Claes, Vincent van der Leest, An Braeken
      Pages 47-64
    4. Modular Anomaly Detection for Smartphone Ad Hoc Communication

      • Jordi Cucurull, Simin Nadjm-Tehrani, Massimiliano Raciti
      Pages 65-81
    5. Mental Voting Booths

      • Jérôme Dossogne, Frédéric Lafitte
      Pages 82-97
    6. Methods for Privacy Protection Considering Status of Service Provider and User Community

      • Kazutomo Hamamoto, Yasuyuki Tahara, Akihiko Ohsuga
      Pages 98-113
    7. Optimized Inlining of Runtime Monitors

      • Frédérick Lemay, Raphaël Khoury, Nadia Tawbi
      Pages 149-161
    8. Feature Reduction to Speed Up Malware Classification

      • Veelasha Moonsamy, Ronghua Tian, Lynn Batten
      Pages 176-188
    9. Rooting Android – Extending the ADB by an Auto-connecting WiFi-Accessible Service

      • Assem Nazar, Mark M. Seeger, Harald Baier
      Pages 189-204
    10. Disjunction Category Labels

      • Deian Stefan, Alejandro Russo, David Mazières, John C. Mitchell
      Pages 223-239
  4. Back Matter

Other Volumes

  1. Information Security Technology for Applications

About this book

This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.

Editors and Affiliations

  • Cybernetica AS, Tartu, Estonia

    Peeter Laud

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access