04143nam 22008295 450 99646603960331620200629144822.01-283-47747-597866134774773-642-17773-510.1007/978-3-642-17773-6(CKB)2670000000064734(SSID)ssj0000476664(PQKBManifestationID)11295616(PQKBTitleCode)TC0000476664(PQKBWorkID)10480563(PQKB)10889188(DE-He213)978-3-642-17773-6(MiAaPQ)EBC3066250(PPN)149893388(EXLCZ)99267000000006473420101210d2010 u| 0engurnn|008mamaatxtccrSecurity Protocols[electronic resource] 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers /edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (VIII, 257 p. 45 illus., 16 illus. in color.) Security and Cryptology ;5964Bibliographic Level Mode of Issuance: Monograph3-642-17772-7 Includes bibliographical references and index.This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.Security and Cryptology ;5964Computer communication systemsData encryption (Computer science)Management information systemsComputer scienceAlgorithmsApplication softwareComputers and civilizationComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Computer communication systems.Data encryption (Computer science).Management information systems.Computer science.Algorithms.Application software.Computers and civilization.Computer Communication Networks.Cryptology.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.Information Systems Applications (incl. Internet).Computers and Society.004.6Christianson Bruceedthttp://id.loc.gov/vocabulary/relators/edtCrispo Brunoedthttp://id.loc.gov/vocabulary/relators/edtMalcolm James Aedthttp://id.loc.gov/vocabulary/relators/edtRoe Michaeledthttp://id.loc.gov/vocabulary/relators/edtBOOK996466039603316Security Protocols772025UNISA