Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1367
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Workshop on Security Protocols ; (24th : ; 2016 : ; Brno, Czech Republic) ;en_US
dc.contributor.authorAnderson, Jonathan ; (Computer scientist), ; editor ;en_US
dc.contributor.authorMatyeesee, Vashek, ; editor ;en_US
dc.contributor.authorChristianson, Bruce, ; editor ;en_US
dc.contributor.authorStajano, Frank, ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:10Z-
dc.date.available2020-05-17T08:28:10Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319620336 ;en_US
dc.identifier.isbn3319620339 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1367-
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionOriginal ; 3319620320 ; 9783319620329 ; (OCoLC)990020536 ;en_US
dc.description.abstractThis book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities ;en_US
dc.description.statementofresponsibilityedited by Jonathan Anderson, Vashek Matyeeee, Bruce Christianson, Frank Stajano (eds.)en_US
dc.description.tableofcontentsEvolving Security -- Considering that security protocols evolve -- Changing requirements -- Changing mechanisms -- Attackers' changing agendas and capabilities ;en_US
dc.format.extent1 online resource (x, 233 pages) : ; illustrations ;en_US
dc.format.extentIncludes author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture notes in computer science, ; 0302-9743 ; ; 10368 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. SL 4, Security and cryptology ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10368. ; 0302-9743 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. ; SL 4, ; Security and cryptology ;en_US
dc.relation.haspart9783319620336.pdfen_US
dc.subjectComputer security ; Congresses ;en_US
dc.titleSecurity protocols XXIV :en_US
dc.title.alternative24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers /en_US
dc.title.alternativeSecurity protocols 24 ;en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319620336.pdf6 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Workshop on Security Protocols ; (24th : ; 2016 : ; Brno, Czech Republic) ;en_US
dc.contributor.authorAnderson, Jonathan ; (Computer scientist), ; editor ;en_US
dc.contributor.authorMatyeesee, Vashek, ; editor ;en_US
dc.contributor.authorChristianson, Bruce, ; editor ;en_US
dc.contributor.authorStajano, Frank, ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:10Z-
dc.date.available2020-05-17T08:28:10Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319620336 ;en_US
dc.identifier.isbn3319620339 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1367-
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionOriginal ; 3319620320 ; 9783319620329 ; (OCoLC)990020536 ;en_US
dc.description.abstractThis book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities ;en_US
dc.description.statementofresponsibilityedited by Jonathan Anderson, Vashek Matyeeee, Bruce Christianson, Frank Stajano (eds.)en_US
dc.description.tableofcontentsEvolving Security -- Considering that security protocols evolve -- Changing requirements -- Changing mechanisms -- Attackers' changing agendas and capabilities ;en_US
dc.format.extent1 online resource (x, 233 pages) : ; illustrations ;en_US
dc.format.extentIncludes author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture notes in computer science, ; 0302-9743 ; ; 10368 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. SL 4, Security and cryptology ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10368. ; 0302-9743 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. ; SL 4, ; Security and cryptology ;en_US
dc.relation.haspart9783319620336.pdfen_US
dc.subjectComputer security ; Congresses ;en_US
dc.titleSecurity protocols XXIV :en_US
dc.title.alternative24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers /en_US
dc.title.alternativeSecurity protocols 24 ;en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319620336.pdf6 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Workshop on Security Protocols ; (24th : ; 2016 : ; Brno, Czech Republic) ;en_US
dc.contributor.authorAnderson, Jonathan ; (Computer scientist), ; editor ;en_US
dc.contributor.authorMatyeesee, Vashek, ; editor ;en_US
dc.contributor.authorChristianson, Bruce, ; editor ;en_US
dc.contributor.authorStajano, Frank, ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:28:10Z-
dc.date.available2020-05-17T08:28:10Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319620336 ;en_US
dc.identifier.isbn3319620339 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1367-
dc.description005.8 ; 23 ;en_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionOriginal ; 3319620320 ; 9783319620329 ; (OCoLC)990020536 ;en_US
dc.description.abstractThis book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities ;en_US
dc.description.statementofresponsibilityedited by Jonathan Anderson, Vashek Matyeeee, Bruce Christianson, Frank Stajano (eds.)en_US
dc.description.tableofcontentsEvolving Security -- Considering that security protocols evolve -- Changing requirements -- Changing mechanisms -- Attackers' changing agendas and capabilities ;en_US
dc.format.extent1 online resource (x, 233 pages) : ; illustrations ;en_US
dc.format.extentIncludes author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture notes in computer science, ; 0302-9743 ; ; 10368 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. SL 4, Security and cryptology ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10368. ; 0302-9743 ;en_US
dc.relation.ispartofseriesLNCS sublibrary. ; SL 4, ; Security and cryptology ;en_US
dc.relation.haspart9783319620336.pdfen_US
dc.subjectComputer security ; Congresses ;en_US
dc.titleSecurity protocols XXIV :en_US
dc.title.alternative24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers /en_US
dc.title.alternativeSecurity protocols 24 ;en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319620336.pdf6 MBAdobe PDFThumbnail
Preview File