Security Protocols 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / [electronic resource] : edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe. - 1st ed. 2010. - VIII, 257 p. 45 illus., 16 illus. in color. online resource. - Security and Cryptology, 5964 2946-1863 ; . - Security and Cryptology, 5964 .

This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.

9783642177736

10.1007/978-3-642-17773-6 doi


Computer networks .
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Algorithms.
Application software.
Computers and civilization.
Computer Communication Networks.
Cryptology.
IT Operations.
Algorithms.
Computer and Information Systems Applications.
Computers and Society.

TK5105.5-5105.9

004.6