Skip to main content
  • Conference proceedings
  • © 2015

Secure IT Systems

20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9417)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): NordSec: Nordic Conference on Secure IT Systems

Conference proceedings info: NordSec 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 papers)

  1. Front Matter

  2. Cyber-Physical Systems Security

    1. Front Matter

      Pages 1-1
    2. A Survey of Industrial Control System Testbeds

      • Hannes Holm, Martin Karresand, Arne Vidström, Erik Westring
      Pages 11-26
    3. The Timed Decentralised Label Model

      • Martin Leth Pedersen, Michael Hedegaard Sørensen, Daniel Lux, Ulrik Nyman, René Rydhof Hansen
      Pages 27-43
  3. Privacy

    1. Front Matter

      Pages 45-45
    2. Resilient Collaborative Privacy for Location-Based Services

      • Hongyu Jin, Panos Papadimitratos
      Pages 47-63
    3. Design of a Privacy-Preserving Document Submission and Grading System

      • Benjamin Greschbach, Guillermo Rodríguez-Cano, Tomas Ericsson, Sonja Buchegger
      Pages 64-71
    4. Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme

      • Daniel Bosk, Martin Kjellqvist, Sonja Buchegger
      Pages 72-87
  4. Cryptography

    1. Front Matter

      Pages 89-89
    2. Faster Binary Curve Software: A Case Study

      • Billy Bob Brumley
      Pages 91-105
    3. WHIRLBOB, the Whirlpool Based Variant of STRIBOB

      • Markku-Juhani O. Saarinen, Billy Bob Brumley
      Pages 106-122
  5. Trust and Fraud

    1. Front Matter

      Pages 137-137
    2. FIDO Trust Requirements

      • Ijlal Loutfi, Audun Jøsang
      Pages 139-155
    3. Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud

      • Edgar Alonso Lopez-Rojas, Stefan Axelsson
      Pages 156-171
  6. Network and Software Security

    1. Front Matter

      Pages 189-189
    2. Challenges in Managing Firewalls

      • Artem Voronkov, Stefan Lindskog, Leonardo A. Martucci
      Pages 191-196
    3. Multi-layer Access Control for SDN-Based Telco Clouds

      • Bernd Jäger, Christian Röpke, Iris Adam, Thorsten Holz
      Pages 197-204

Other Volumes

  1. Secure IT Systems

About this book

This book constitutes the proceedings of the 20th Nordic Conference on Secure IT Systems, held in Stockholm, Sweden, in October 2015.

The 11 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 38 submissions. They are organized in topical sections named: cyber-physical systems security, privacy, cryptography, trust and fraud, and network and software security.

Editors and Affiliations

  • KTH Royal Institute of Technology , Stockholm, Sweden

    Sonja Buchegger, Mads Dam

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access