02358nam 2200565Ia 450 991048298110332120200520144314.01-283-47747-597866134774773-642-17773-510.1007/978-3-642-17773-6(CKB)2670000000064734(SSID)ssj0000476664(PQKBManifestationID)11295616(PQKBTitleCode)TC0000476664(PQKBWorkID)10480563(PQKB)10889188(DE-He213)978-3-642-17773-6(MiAaPQ)EBC3066250(PPN)149893388(EXLCZ)99267000000006473420010221d2010 uy 0engurnn|008mamaatxtccrSecurity protocols 15th Workshop, Brno, Czech Republic, April 18-20, 2007, revised selected papers /Bruce Christianson ... [et al.] (eds.)1st ed. 2010.Berlin ;New York Springerc20101 online resource (VIII, 257 p. 45 illus., 16 illus. in color.) Lecture notes in computer science ;5964Bibliographic Level Mode of Issuance: Monograph3-642-17772-7 Includes bibliographical references and index.This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.Lecture notes in computer science ;5964.Computer securityCongressesSecurity systemsCongressesComputer securitySecurity systems004.6Christianson Bruce1750121MiAaPQMiAaPQMiAaPQBOOK9910482981103321Security protocols4184674UNINA