Staff View for: Security protocols : 15th international

 Staff view

You must be logged in to Tag Records

Security protocols : 15th international workshop, Brno, Czech Republic, April 2007 : revised selected papers /

Bruce Christianson [and others] (eds.).

Book Cover
Names: Christianson, Bruce.
Published: Berlin : Springer, 2010.
Series: Lecture notes in computer science ; 5964.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Computer security - Congresses. | Cryptography - Congresses.
Genres: Electronic books. | Conference papers and proceedings.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 02642cam a2200469Ia 4500
001 11838910
005 20190609222033.0
006 m o d
007 cr |||||||||||
008 110110s2010 gw a ob 101 0 eng d
019 |a1102532463
020 |a9783642177736
020 |a3642177735
035 |a(OCoLC)ocn696014568
035 |a(RMCdb)244984
040 |aOUN|beng|epn|cOUN|dCUS|dOUN|dOCLCQ|dOL$|dOCLCO|dOCLCQ|dOCLCF|dOCLCO|dA7U|dYDXCP|dOCL|dOCLCO|dEBLCP|dOCLCQ|dOCLCA|dIOG|dOCLCA|dBUF|dOCLCQ|dRMCdb
049 |aJVQA
050 4|aQA76.9.A25
082 04|a005.8|222
111 2 |aInternational Workshop on Security Protocols|n(15th :|d2007 :|cBrno, Czech Republic)
245 10|aSecurity protocols :|b15th international workshop, Brno, Czech Republic, April 2007 : revised selected papers /|cBruce Christianson [and others] (eds.).
260 |aBerlin :|bSpringer,|c2010.
300 |a1 online resource (ix, 256 pages) :|billustrations
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
490 1 |aLecture notes in computer science,|x0302-9743 ;|v5964
490 1 |aLNCS sublibrary. SL 4, Security and cryptology
520 |aThis book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
588 0 |aHttp://rave.ohiolink.edu/ebooks/ebc/9783642177736 viewed 2011- 1- 10.
590 |aOCLC|bWorldCat Holdings
650 0|aComputer security|vCongresses.
650 0|aCryptography|vCongresses.
650 7|aComputer security.|2fast|0(OCoLC)fst00872484
650 7|aCryptography.|2fast|0(OCoLC)fst00884552
655 4|aElectronic books.
655 7|aConference papers and proceedings.|2fast|0(OCoLC)fst01423772
700 1 |aChristianson, Bruce.
830 0|aLecture notes in computer science ;|v5964.|x0302-9743
830 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology.
856 40|3SpringerLink|uhttp://library.robertmorris.edu:2048/login?url=http://dx.doi.org/10.1007/978-3-642-17773-6|zAvailable to current RMU students, faculty, and staff. Click here for full text.
994 |a92|bJVQ

Staff View for: Security protocols : 15th international