Security protocols XXIV : 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers / edited by Jonathan Anderson, Vashek Matyáš, Bruce Christianson, Frank Stajano (eds.).
2017
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Security protocols XXIV : 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers / edited by Jonathan Anderson, Vashek Matyáš, Bruce Christianson, Frank Stajano (eds.).
ISBN
9783319620336 (electronic book)
3319620339 (electronic book)
9783319620329
3319620320
3319620339 (electronic book)
9783319620329
3319620320
Published
Cham : Springer, 2017.
Language
English
Description
1 online resource (x, 233 pages) : illustrations.
Item Number
10.1007/978-3-319-62033-6 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities.
Note
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed July 28, 2017).
Added Author
Anderson, Jonathan (Computer scientist), editor.
Matyás̆, Vashek, editor.
Christianson, Bruce, editor.
Stajano, Frank, editor.
Matyás̆, Vashek, editor.
Christianson, Bruce, editor.
Stajano, Frank, editor.
Series
Lecture notes in computer science ; 10368.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783319620329
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Evolving Security
Considering that security protocols evolve
Changing requirements
Changing mechanisms
Attackers' changing agendas and capabilities.
Considering that security protocols evolve
Changing requirements
Changing mechanisms
Attackers' changing agendas and capabilities.