Vai al contenuto principale della pagina

Security Protocols XVI [[electronic resource] ] : 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Security Protocols XVI [[electronic resource] ] : 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers / / edited by Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe Visualizza cluster
Pubblicazione: Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Edizione: 1st ed. 2011.
Descrizione fisica: 1 online resource (IX, 257 p.)
Disciplina: 005.82
Soggetto topico: Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Operating systems (Computers)
Application software
Computers
Law and legislation
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Operating Systems
Information Systems Applications (incl. Internet)
Legal Aspects of Computing
Persona (resp. second.): ChristiansonBruce
MalcolmJames (Computer scientist)
MatyasVashek
RoeMichael
Note generali: Bibliographic Level Mode of Issuance: Monograph
Nota di bibliografia: Includes bibliographical references and index.
Sommario/riassunto: This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was “Remodelling the Attacker” with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn’t the attacker’s capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
Titolo autorizzato: Security Protocols XVI  Visualizza cluster
ISBN: 3-642-22137-8
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996465743303316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Security and Cryptology ; ; 6615