Security protocols XXIII : 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers /
Saved in:
Meeting name: | International Workshop on Security Protocols (23rd : 2015 : Cambridge, England) |
---|---|
Imprint: | Cham : Springer, 2015. |
Description: | 1 online resource (xi, 367 pages) : color illustrations. |
Language: | English |
Series: | Lecture Notes in Computer Science, 0302-9743 ; 9379 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 9379. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11097022 |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | 11097022 | ||
005 | 20170630045651.6 | ||
006 | m o d | ||
007 | cr nn|008mamaa | ||
008 | 151124s2015 sz a od 100 0 eng d | ||
003 | ICU | ||
040 | |a NUI |b eng |e pn |c NUI |d OCLCO |d AZU |d ORU |d OCLCF |d GW5XE |d OCLCO |d YDXCP |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d JBG |d IAO |d IAS |d IAD |d KSU |d ICN |d SOI |d VT2 |d OCLCQ |d ILO | ||
019 | |a 932002639 |a 961859640 |a 963346467 |a 964837316 | ||
020 | |a 9783319260969 |q (electronic bk.) | ||
020 | |a 3319260960 |q (electronic bk.) | ||
020 | |z 9783319260952 | ||
020 | |z 3319260952 | ||
024 | 7 | |a 10.1007/978-3-319-26096-9 |2 doi | |
035 | |a (OCoLC)932170221 |z (OCoLC)932002639 |z (OCoLC)961859640 |z (OCoLC)963346467 |z (OCoLC)964837316 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
049 | |a MAIN | ||
111 | 2 | |a International Workshop on Security Protocols |n (23rd : |d 2015 : |c Cambridge, England) |0 http://id.loc.gov/authorities/names/nb2016001324 |1 http://viaf.org/viaf/91145541772196600391 | |
245 | 1 | 0 | |a Security protocols XXIII : |b 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers / |c edited by Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson. |
246 | 3 | |a Security protocols 23 | |
264 | 1 | |a Cham : |b Springer, |c 2015. | |
300 | |a 1 online resource (xi, 367 pages) : |b color illustrations. | ||
336 | |a text |b txt |2 rdacontent |0 http://id.loc.gov/vocabulary/contentTypes/txt | ||
337 | |a computer |b c |2 rdamedia |0 http://id.loc.gov/vocabulary/mediaTypes/c | ||
338 | |a online resource |b cr |2 rdacarrier |0 http://id.loc.gov/vocabulary/carriers/cr | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 9379 | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
520 | |a This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact." | ||
650 | 0 | |a Computer security |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101458 | |
650 | 0 | |a Computer science. |0 http://id.loc.gov/authorities/subjects/sh89003285 | |
650 | 0 | |a Computer networks. |0 http://id.loc.gov/authorities/subjects/sh85029513 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Management information systems. |0 http://id.loc.gov/authorities/subjects/sh85080359 | |
650 | 1 | 4 | |a Computer Science. |
650 | 2 | 4 | |a Systems and Data Security. |
650 | 2 | 4 | |a Data Encryption. |
650 | 2 | 4 | |a Management of Computing and Information Systems. |
650 | 2 | 4 | |a Computer Communication Networks. |
650 | 7 | |a Computer networks. |2 fast |0 (OCoLC)fst00872297 | |
650 | 7 | |a Computer science. |2 fast |0 (OCoLC)fst00872451 | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
650 | 7 | |a Management information systems. |2 fast |0 (OCoLC)fst01007271 | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772 | |
700 | 1 | |a Christianson, Bruce, |e editor. |0 http://id.loc.gov/authorities/names/n98070906 |1 http://viaf.org/viaf/18011908 | |
700 | 1 | |a Švenda, Petr, |e editor. |1 http://viaf.org/viaf/1498159474203327661359 | |
700 | 1 | |a Matyáš, Vashek, |e editor. |1 http://viaf.org/viaf/33145910210027022957 | |
700 | 1 | |a Malcolm, James |c (Computer scientist), |e editor. |0 http://id.loc.gov/authorities/names/nb2013004471 |1 http://viaf.org/viaf/296963699 | |
700 | 1 | |a Stajano, Frank, |e editor. |0 http://id.loc.gov/authorities/names/n2001014069 |1 http://viaf.org/viaf/43019890 | |
700 | 1 | |a Anderson, Jonathan, |e editor. |0 http://id.loc.gov/authorities/names/no2017108837 |1 http://viaf.org/viaf/51282457 | |
776 | 0 | 8 | |i Printed edition: |z 9783319260952 |
830 | 0 | |a Lecture notes in computer science ; |v 9379. |x 0302-9743 | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |u http://link.springer.com/10.1007/978-3-319-26096-9 |y SpringerLink |
903 | |a HeVa | ||
929 | |a eresource | ||
999 | f | f | |i f8212730-b498-5c48-b306-6d6f0be9b00f |s 77d7de4a-3354-5a08-b969-8e04718610e6 |
928 | |t Library of Congress classification |a QA76.9.A25 |l Online |c UC-FullText |u http://link.springer.com/10.1007/978-3-319-26096-9 |z SpringerLink |g ebooks |i 9911284 |