000796497 000__ 02905cam\a2200553Ii\4500 000796497 001__ 796497 000796497 005__ 20230306143531.0 000796497 006__ m\\\\\o\\d\\\\\\\\ 000796497 007__ cr\cnunnnunuuu 000796497 008__ 170728s2017\\\\sz\a\\\\o\\\\\101\0\eng\d 000796497 019__ $$a999480225 000796497 020__ $$a9783319620336$$q(electronic book) 000796497 020__ $$a3319620339$$q(electronic book) 000796497 020__ $$z9783319620329 000796497 020__ $$z3319620320 000796497 0247_ $$a10.1007/978-3-319-62033-6$$2doi 000796497 035__ $$aSP(OCoLC)ocn995279251 000796497 035__ $$aSP(OCoLC)995279251$$z(OCoLC)999480225 000796497 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dNJR$$dUAB 000796497 049__ $$aISEA 000796497 050_4 $$aQA76.9.A25 000796497 08204 $$a005.8$$223 000796497 1112_ $$aInternational Workshop on Security Protocols$$n(24th :$$d2016 :$$cBrno, Czech Republic) 000796497 24510 $$aSecurity protocols XXIV :$$b24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers /$$cedited by Jonathan Anderson, Vashek Matyáš, Bruce Christianson, Frank Stajano (eds.). 000796497 2463_ $$aSecurity protocols 24 000796497 264_1 $$aCham :$$bSpringer,$$c2017. 000796497 300__ $$a1 online resource (x, 233 pages) :$$billustrations. 000796497 336__ $$atext$$btxt$$2rdacontent 000796497 337__ $$acomputer$$bc$$2rdamedia 000796497 338__ $$aonline resource$$bcr$$2rdacarrier 000796497 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10368 000796497 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000796497 500__ $$aIncludes author index. 000796497 5050_ $$aEvolving Security -- Considering that security protocols evolve -- Changing requirements -- Changing mechanisms -- Attackers' changing agendas and capabilities. 000796497 506__ $$aAccess limited to authorized users. 000796497 520__ $$aThis book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities. 000796497 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 28, 2017). 000796497 650_0 $$aComputer security$$vCongresses. 000796497 7001_ $$aAnderson, Jonathan$$c(Computer scientist),$$eeditor. 000796497 7001_ $$aMatyás̆, Vashek,$$eeditor. 000796497 7001_ $$aChristianson, Bruce,$$eeditor. 000796497 7001_ $$aStajano, Frank,$$eeditor. 000796497 77608 $$iPrint version:$$z3319620320$$z9783319620329$$w(OCoLC)990020536 000796497 830_0 $$aLecture notes in computer science ;$$v10368. 000796497 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000796497 85280 $$bebk$$hSpringerLink 000796497 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-62033-6$$zOnline Access$$91397441.1 000796497 909CO $$ooai:library.usi.edu:796497$$pGLOBAL_SET 000796497 980__ $$aEBOOK 000796497 980__ $$aBIB 000796497 982__ $$aEbook 000796497 983__ $$aOnline 000796497 994__ $$a92$$bISE