000 | 03240nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-17773-6 | ||
003 | DE-He213 | ||
005 | 20240730182524.0 | ||
007 | cr nn 008mamaa | ||
008 | 101210s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642177736 _9978-3-642-17773-6 |
||
024 | 7 |
_a10.1007/978-3-642-17773-6 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aSecurity Protocols _h[electronic resource] : _b15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / _cedited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe. |
250 | _a1st ed. 2010. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2010. |
|
300 |
_aVIII, 257 p. 45 illus., 16 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v5964 |
|
520 | _aThis book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9128426 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aApplication software. _9128427 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9128428 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9128429 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aChristianson, Bruce. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9128430 |
|
700 | 1 |
_aCrispo, Bruno. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9128431 |
|
700 | 1 |
_aMalcolm, James A. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9128432 |
|
700 | 1 |
_aRoe, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9128433 |
|
710 | 2 |
_aSpringerLink (Online service) _9128434 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642177729 |
776 | 0 | 8 |
_iPrinted edition: _z9783642177743 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v5964 _9128435 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-17773-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c91397 _d91397 |