LEADER 04143nam 22008295 450 001 996466039603316 005 20200629144822.0 010 $a1-283-47747-5 010 $a9786613477477 010 $a3-642-17773-5 024 7 $a10.1007/978-3-642-17773-6 035 $a(CKB)2670000000064734 035 $a(SSID)ssj0000476664 035 $a(PQKBManifestationID)11295616 035 $a(PQKBTitleCode)TC0000476664 035 $a(PQKBWorkID)10480563 035 $a(PQKB)10889188 035 $a(DE-He213)978-3-642-17773-6 035 $a(MiAaPQ)EBC3066250 035 $a(PPN)149893388 035 $a(EXLCZ)992670000000064734 100 $a20101210d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Protocols$b[electronic resource] $e15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers /$fedited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (VIII, 257 p. 45 illus., 16 illus. in color.) 225 1 $aSecurity and Cryptology ;$v5964 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-17772-7 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions. 410 0$aSecurity and Cryptology ;$v5964 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aApplication software 606 $aComputers and civilization 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aApplication software. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputers and Society. 676 $a004.6 702 $aChristianson$b Bruce$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCrispo$b Bruno$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMalcolm$b James A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRoe$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466039603316 996 $aSecurity Protocols$9772025 997 $aUNISA