Security protocols XXIII : 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers /

Saved in:
Bibliographic Details
Meeting name:International Workshop on Security Protocols (23rd : 2015 : Cambridge, England)
Imprint:Cham : Springer, 2015.
Description:1 online resource (xi, 367 pages) : color illustrations.
Language:English
Series:Lecture Notes in Computer Science, 0302-9743 ; 9379
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 9379.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11097022
Hidden Bibliographic Details
Varying Form of Title:Security protocols 23
Other authors / contributors:Christianson, Bruce, editor.
Švenda, Petr, editor.
Matyáš, Vashek, editor.
Malcolm, James (Computer scientist), editor.
Stajano, Frank, editor.
Anderson, Jonathan, editor.
ISBN:9783319260969
3319260960
9783319260952
3319260952
Digital file characteristics:text file PDF
Summary:This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact."
Other form:Printed edition: 9783319260952
Standard no.:10.1007/978-3-319-26096-9

MARC

LEADER 00000cam a2200000Mi 4500
001 11097022
005 20170630045651.6
006 m o d
007 cr nn|008mamaa
008 151124s2015 sz a od 100 0 eng d
003 ICU
040 |a NUI  |b eng  |e pn  |c NUI  |d OCLCO  |d AZU  |d ORU  |d OCLCF  |d GW5XE  |d OCLCO  |d YDXCP  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d JBG  |d IAO  |d IAS  |d IAD  |d KSU  |d ICN  |d SOI  |d VT2  |d OCLCQ  |d ILO 
019 |a 932002639  |a 961859640  |a 963346467  |a 964837316 
020 |a 9783319260969  |q (electronic bk.) 
020 |a 3319260960  |q (electronic bk.) 
020 |z 9783319260952 
020 |z 3319260952 
024 7 |a 10.1007/978-3-319-26096-9  |2 doi 
035 |a (OCoLC)932170221  |z (OCoLC)932002639  |z (OCoLC)961859640  |z (OCoLC)963346467  |z (OCoLC)964837316 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
049 |a MAIN 
111 2 |a International Workshop on Security Protocols  |n (23rd :  |d 2015 :  |c Cambridge, England)  |0 http://id.loc.gov/authorities/names/nb2016001324  |1 http://viaf.org/viaf/91145541772196600391 
245 1 0 |a Security protocols XXIII :  |b 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers /  |c edited by Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson. 
246 3 |a Security protocols 23 
264 1 |a Cham :  |b Springer,  |c 2015. 
300 |a 1 online resource (xi, 367 pages) :  |b color illustrations. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 9379 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
520 |a This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact." 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458 
650 0 |a Computer science.  |0 http://id.loc.gov/authorities/subjects/sh89003285 
650 0 |a Computer networks.  |0 http://id.loc.gov/authorities/subjects/sh85029513 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524 
650 0 |a Management information systems.  |0 http://id.loc.gov/authorities/subjects/sh85080359 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Data Encryption. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Computer Communication Networks. 
650 7 |a Computer networks.  |2 fast  |0 (OCoLC)fst00872297 
650 7 |a Computer science.  |2 fast  |0 (OCoLC)fst00872451 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Management information systems.  |2 fast  |0 (OCoLC)fst01007271 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Christianson, Bruce,  |e editor.  |0 http://id.loc.gov/authorities/names/n98070906  |1 http://viaf.org/viaf/18011908 
700 1 |a Švenda, Petr,  |e editor.  |1 http://viaf.org/viaf/1498159474203327661359 
700 1 |a Matyáš, Vashek,  |e editor.  |1 http://viaf.org/viaf/33145910210027022957 
700 1 |a Malcolm, James  |c (Computer scientist),  |e editor.  |0 http://id.loc.gov/authorities/names/nb2013004471  |1 http://viaf.org/viaf/296963699 
700 1 |a Stajano, Frank,  |e editor.  |0 http://id.loc.gov/authorities/names/n2001014069  |1 http://viaf.org/viaf/43019890 
700 1 |a Anderson, Jonathan,  |e editor.  |0 http://id.loc.gov/authorities/names/no2017108837  |1 http://viaf.org/viaf/51282457 
776 0 8 |i Printed edition:  |z 9783319260952 
830 0 |a Lecture notes in computer science ;  |v 9379.  |x 0302-9743 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |u http://link.springer.com/10.1007/978-3-319-26096-9  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i f8212730-b498-5c48-b306-6d6f0be9b00f  |s 77d7de4a-3354-5a08-b969-8e04718610e6 
928 |t Library of Congress classification  |a QA76.9.A25  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-319-26096-9  |z SpringerLink  |g ebooks  |i 9911284