Editors:
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8809)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols
Conference proceedings info: Security Protocols 2014.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (36 papers)
-
Front Matter
About this book
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy".
Editors and Affiliations
-
University of Hertfordshire, Hertfordshire, United Kingdom
Bruce Christianson, James Malcolm
-
Masaryk University Faculty of Informatics, Brno, Czech Republic
Vashek Matyáš, Petr Švenda
-
University of Cambridge, Cambridge, United Kingdom
Frank Stajano
-
Memorial University of Newfoundland, St. John's, Canada
Jonathan Anderson
Bibliographic Information
Book Title: Security Protocols XXII
Book Subtitle: 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers
Editors: Bruce Christianson, James Malcolm, Vashek Matyáš, Petr Švenda, Frank Stajano, Jonathan Anderson
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-12400-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Softcover ISBN: 978-3-319-12399-8Published: 10 November 2014
eBook ISBN: 978-3-319-12400-1Published: 28 October 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XI, 373
Number of Illustrations: 40 b/w illustrations
Topics: Systems and Data Security, Cryptology, Computer Communication Networks, Management of Computing and Information Systems