LEADER 04444nam 22008415 450 001 996465743303316 005 20211221180419.0 010 $a3-642-22137-8 024 7 $a10.1007/978-3-642-22137-8 035 $a(CKB)2670000000095942 035 $a(SSID)ssj0000541137 035 $a(PQKBManifestationID)11357104 035 $a(PQKBTitleCode)TC0000541137 035 $a(PQKBWorkID)10494014 035 $a(PQKB)11033278 035 $a(DE-He213)978-3-642-22137-8 035 $a(MiAaPQ)EBC3066936 035 $a(PPN)156308495 035 $a(EXLCZ)992670000000095942 100 $a20110702d2011 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Protocols XVI$b[electronic resource] $e16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers /$fedited by Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (IX, 257 p.) 225 1 $aSecurity and Cryptology ;$v6615 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-22136-X 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was ?Remodelling the Attacker? with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn?t the attacker?s capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries. 410 0$aSecurity and Cryptology ;$v6615 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aOperating systems (Computers) 606 $aApplication software 606 $aComputers 606 $aLaw and legislation 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aOperating systems (Computers). 615 0$aApplication software. 615 0$aComputers. 615 0$aLaw and legislation. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aOperating Systems. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aLegal Aspects of Computing. 676 $a005.82 702 $aChristianson$b Bruce$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalcolm$b James$c(Computer scientist)$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMatyas$b Vashek$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRoe$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Security Protocols 906 $aBOOK 912 $a996465743303316 996 $aSecurity Protocols XVI$92831200 997 $aUNISA