Item Details

Print View

Security Protocols [electronic resource]: 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers

Christianson, Bruce; Crispo, Bruno; Malcolm, James A; Roe, Michael
Format
EBook; Book; Online
Published
New York : Springer Jan. 2011
Language
English
Series
Lecture Notes in Computer Science / Security and Cryptology Ser
ISBN
9783642177729, 3642177727 (Trade Paper)
Target Audience
Scholarly & Professional
Summary
Annotation
Description
Mode of access: World wide Web.
Copyright Not EvaluatedCopyright Not Evaluated
Technical Details
  • Access in Virgo Classic
  • Staff View

    LEADER 02163cam a22004092 4500
    001 u5362713
    003 SIRSI
    005 20120208134851.0
    006 m d
    007 cr n
    008 101114e20110104nju s|||||||| 2|eng|d
    020
      
      
    a| 9783642177729
    020
      
      
    a| 3642177727 (Trade Paper) c| USD 72.00 Retail Price (Publisher) 9| Active Record
    024
    3
      
    a| 9783642177729
    035
      
      
    a| (WaSeSS)ssj0000476664
    037
      
      
    a| 3642177727 b| 00024965
    040
      
      
    a| BIP US d| WaSeSS
    100
    1
      
    a| Christianson, Bruce e| Editor 4| edt
    245
    1
    0
    a| Security Protocols h| [electronic resource]: b| 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers
    260
      
      
    a| New York : b| Springer c| Jan. 2011
    440
      
    0
    a| Lecture Notes in Computer Science / Security and Cryptology Ser.
    520
    8
      
    a| Annotation b| This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007.The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
    521
      
      
    a| Scholarly & Professional b| Springer
    538
      
      
    a| Mode of access: World wide Web.
    655
      
    0
    a| Electronic books.
    690
      
      
    a| Computer Security
    690
      
      
    a| Cryptography
    692
      
      
    a| Computers x| Security x| General
    692
      
      
    a| Language Arts & Disciplines x| Communication Studies
    700
    1
      
    a| Crispo, Bruno e| Editor 4| edt
    700
    1
      
    a| Malcolm, James A. e| Editor 4| edt
    700
    1
      
    a| Roe, Michael e| Editor 4| edt
    710
    2
      
    a| SpringerLINK Lecture Notes in Computer Science
    856
    4
    0
    u| http://RE5QY4SB7X.search.serialssolutions.com/?V=1.0&L=RE5QY4SB7X&S=JCs&C=TC0000476664&T=marc
    596
      
      
    a| 1
    999
      
      
    a| XX(5362713.1) w| WEB i| 5362713-1001 l| INTERNET m| UVA-LIB t| INTERNET
▾See more
▴See less

Availability

Google Preview

Google Books Preview

Read Online