LEADER 03505nam 22007095 450 001 9910484898203321 005 20200710130540.0 010 $a3-319-62033-9 024 7 $a10.1007/978-3-319-62033-6 035 $a(CKB)4340000000061617 035 $a(DE-He213)978-3-319-62033-6 035 $a(MiAaPQ)EBC6296090 035 $a(MiAaPQ)EBC5576815 035 $a(Au-PeEL)EBL5576815 035 $a(OCoLC)995279251 035 $a(PPN)203668677 035 $a(EXLCZ)994340000000061617 100 $a20170718d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity Protocols XXIV $e24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers /$fedited by Jonathan Anderson, Vashek Matyá?, Bruce Christianson, Frank Stajano 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (X, 233 p. 23 illus.) 225 1 $aSecurity and Cryptology ;$v10368 311 $a3-319-62032-0 327 $aEvolving Security -- Considering that security protocols evolve -- Changing requirements -- Changing mechanisms -- Attackers' changing agendas and capabilities. 330 $aThis book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities. 410 0$aSecurity and Cryptology ;$v10368 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aAnderson$b Jonathan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMatyá?$b Vashek$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChristianson$b Bruce$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aStajano$b Frank$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484898203321 996 $aSecurity Protocols XXIV$92830054 997 $aUNINA