Logo - springer
Slogan - springer

Computer Science - Communication Networks | Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised

Security Protocols

15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers

Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (Eds.)

2011, VIII, 257p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 

ISBN 978-3-642-17773-6

digitally watermarked, no DRM

The eBook version of this title will be available soon


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$89.99

(net) price for USA

ISBN 978-3-642-17772-9

free shipping for individuals worldwide

online orders shipping within 2-3 days.


add to marked items

  • Unique visibility
  • State-of-the-art survey
  • Fast-track conference proceedings
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.

Content Level » Research

Keywords » grid computing - hash functions - information leakage - isotropic channels - measurable security - privacy - public keys - secure sessions - security protocols - signatures - social networks - theorem proving - voting systems

Related subjects » Communication Networks - Database Management & Information Retrieval - General Issues - Security and Cryptology - Software Engineering - Theoretical Computer Science

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.