Security Protocols [electronic resource] : 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
Contributor(s): Christianson, Bruce [editor.] | Crispo, Bruno [editor.] | Malcolm, James A [editor.] | Roe, Michael [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 5964Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010Edition: 1st ed. 2010.Description: VIII, 257 p. 45 illus., 16 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642177736.Subject(s): Computer networks | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Algorithms | Application software | Computers and civilization | Computer Communication Networks | Cryptology | IT Operations | Algorithms | Computer and Information Systems Applications | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.No physical items for this record
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
There are no comments for this item.