LEADER 02358nam 2200565Ia 450 001 9910482981103321 005 20200520144314.0 010 $a1-283-47747-5 010 $a9786613477477 010 $a3-642-17773-5 024 7 $a10.1007/978-3-642-17773-6 035 $a(CKB)2670000000064734 035 $a(SSID)ssj0000476664 035 $a(PQKBManifestationID)11295616 035 $a(PQKBTitleCode)TC0000476664 035 $a(PQKBWorkID)10480563 035 $a(PQKB)10889188 035 $a(DE-He213)978-3-642-17773-6 035 $a(MiAaPQ)EBC3066250 035 $a(PPN)149893388 035 $a(EXLCZ)992670000000064734 100 $a20010221d2010 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aSecurity protocols $e15th Workshop, Brno, Czech Republic, April 18-20, 2007, revised selected papers /$fBruce Christianson ... [et al.] (eds.) 205 $a1st ed. 2010. 210 $aBerlin ;$aNew York $cSpringer$dc2010 215 $a1 online resource (VIII, 257 p. 45 illus., 16 illus. in color.) 225 1 $aLecture notes in computer science ;$v5964 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-17772-7 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions. 410 0$aLecture notes in computer science ;$v5964. 606 $aComputer security$vCongresses 606 $aSecurity systems$vCongresses 615 0$aComputer security 615 0$aSecurity systems 676 $a004.6 701 $aChristianson$b Bruce$01750121 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910482981103321 996 $aSecurity protocols$94184674 997 $aUNINA