書(shū)目名稱 | Security Protocols |
副標(biāo)題 | 15th International W |
編輯 | Bruce Christianson,Bruno Crispo,Michael Roe |
視頻video | http://file.papertrans.cn/864/863413/863413.mp4 |
概述 | Unique visibility.State-of-the-art survey.Fast-track conference proceedings |
叢書(shū)名稱 | Lecture Notes in Computer Science |
圖書(shū)封面 |  |
描述 | This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007.The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions. |
出版日期 | Conference proceedings 2010 |
關(guān)鍵詞 | grid computing; hash functions; information leakage; isotropic channels; measurable security; privacy; pub |
版次 | 1 |
doi | https://doi.org/10.1007/978-3-642-17773-6 |
isbn_softcover | 978-3-642-17772-9 |
isbn_ebook | 978-3-642-17773-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 |
issn_series | 0302-9743 |
copyright | Springer Berlin Heidelberg 2010 |