000716900 000__ 02670cam\a2200577Mi\4500 000716900 001__ 716900 000716900 005__ 20230306140150.0 000716900 006__ m\\\\\o\\d\\\\\\\\ 000716900 007__ cr\un\nnnunnun 000716900 008__ 141106s2014\\\\sz\a\\\\ob\\\\101\0\eng\d 000716900 020__ $$a9783319124001$$qelectronic book 000716900 020__ $$a3319124005$$qelectronic book 000716900 020__ $$z9783319123998 000716900 020__ $$z3319123998 000716900 035__ $$aSP(OCoLC)ocn894609552 000716900 035__ $$a716900 000716900 040__ $$aNLGGC$$beng$$erda$$epn$$cNLGGC$$dOCLCO$$dYDXCP$$dGW5XE$$dUPM 000716900 049__ $$aISEA 000716900 050_4 $$aQA76.9.A25$$bI574 2014eb 000716900 08204 $$a005.8$$223 000716900 1112_ $$aInternational Workshop on Security Protocols$$n(22nd :$$d2014 :$$cCambridge, UK) 000716900 24510 $$aSecurity protocols XXII$$h[electronic resource] :$$b22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised selected papers /$$cBruce Christianson, James Malcolm, Vashek Matyáš, Petr Švenda, Frank Stajano, Jonathan Anderson (eds.). 000716900 2463_ $$aSecurity protocols 22 000716900 264_1 $$aCham :$$bSpringer,$$c2014. 000716900 300__ $$a1 online resource (xi, 373 pages) :$$billustrations. 000716900 336__ $$atext$$btxt$$2rdacontent 000716900 337__ $$acomputer$$bc$$2rdamedia 000716900 338__ $$aonline resource$$bcr$$2rdacarrier 000716900 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v8809 000716900 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000716900 504__ $$aIncludes bibliographical references and index. 000716900 506__ $$aAccess limited to authorized users. 000716900 520__ $$aThis book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. The volume contains 36 revised papers with transcripts of the presentation and workshop discussion and an introduction. The theme of this year's workshop is "Collaborating with the Enemy". 000716900 650_0 $$aComputer security$$vCongresses. 000716900 650_0 $$aData encryption (Computer science)$$vCongresses. 000716900 650_0 $$aComputer science. 000716900 650_0 $$aComputer networks. 000716900 650_0 $$aData protection. 000716900 650_0 $$aData encryption (Computer science) 000716900 7001_ $$aChristianson, Bruce,$$eeditor. 000716900 7001_ $$aMalcolm, James,$$eeditor. 000716900 7001_ $$aMatyás̆, Vashek,$$eeditor. 000716900 7001_ $$aŠvenda, Petr,$$eeditor. 000716900 7001_ $$aStajano, Frank,$$eeditor. 000716900 7001_ $$aAnderson, Jonathan,$$c(Computer scientist)$$eeditor. 000716900 830_0 $$aLecture notes in computer science ;$$v8809. 000716900 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000716900 85280 $$bebk$$hSpringerLink 000716900 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-12400-1$$zOnline Access 000716900 909CO $$ooai:library.usi.edu:716900$$pGLOBAL_SET 000716900 980__ $$aEBOOK 000716900 980__ $$aBIB 000716900 982__ $$aEbook 000716900 983__ $$aOnline 000716900 994__ $$a92$$bISE