Security Protocols
15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers
Editors: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (Eds.)
Free Preview- Unique visibility
- State-of-the-art survey
- Fast-track conference proceedings
Buy this book
- About this book
-
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.
- Table of contents (30 chapters)
-
-
When Is a Protocol Broken? (Transcript of Discussion)
Pages 1-2
-
Measurable Security through Isotropic Channels
Pages 3-12
-
Measurable Security through Isotropic Channels (Transcript of Discussion)
Pages 13-19
-
Modeling Partial Attacks with Alloy
Pages 20-33
-
Modeling Partial Attacks with Alloy (Transcript of Discussion)
Pages 34-36
-
Table of contents (30 chapters)
Recommended for you

Bibliographic Information
- Bibliographic Information
-
- Book Title
- Security Protocols
- Book Subtitle
- 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers
- Editors
-
- Bruce Christianson
- Bruno Crispo
- James A. Malcolm
- Michael Roe
- Series Title
- Security and Cryptology
- Series Volume
- 5964
- Copyright
- 2010
- Publisher
- Springer-Verlag Berlin Heidelberg
- Copyright Holder
- Springer Berlin Heidelberg
- eBook ISBN
- 978-3-642-17773-6
- DOI
- 10.1007/978-3-642-17773-6
- Softcover ISBN
- 978-3-642-17772-9
- Edition Number
- 1
- Number of Pages
- VIII, 257
- Number of Illustrations
- 29 b/w illustrations, 16 illustrations in colour
- Topics