Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1367
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | International Workshop on Security Protocols ; (24th : ; 2016 : ; Brno, Czech Republic) ; | en_US |
dc.contributor.author | Anderson, Jonathan ; (Computer scientist), ; editor ; | en_US |
dc.contributor.author | Matyeesee, Vashek, ; editor ; | en_US |
dc.contributor.author | Christianson, Bruce, ; editor ; | en_US |
dc.contributor.author | Stajano, Frank, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:10Z | - |
dc.date.available | 2020-05-17T08:28:10Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319620336 ; | en_US |
dc.identifier.isbn | 3319620339 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1367 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Original ; 3319620320 ; 9783319620329 ; (OCoLC)990020536 ; | en_US |
dc.description.abstract | This book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities ; | en_US |
dc.description.statementofresponsibility | edited by Jonathan Anderson, Vashek Matyeeee, Bruce Christianson, Frank Stajano (eds.) | en_US |
dc.description.tableofcontents | Evolving Security -- Considering that security protocols evolve -- Changing requirements -- Changing mechanisms -- Attackers' changing agendas and capabilities ; | en_US |
dc.format.extent | 1 online resource (x, 233 pages) : ; illustrations ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10368 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10368. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319620336.pdf | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.title | Security protocols XXIV : | en_US |
dc.title.alternative | 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers / | en_US |
dc.title.alternative | Security protocols 24 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319620336.pdf | 6 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | International Workshop on Security Protocols ; (24th : ; 2016 : ; Brno, Czech Republic) ; | en_US |
dc.contributor.author | Anderson, Jonathan ; (Computer scientist), ; editor ; | en_US |
dc.contributor.author | Matyeesee, Vashek, ; editor ; | en_US |
dc.contributor.author | Christianson, Bruce, ; editor ; | en_US |
dc.contributor.author | Stajano, Frank, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:10Z | - |
dc.date.available | 2020-05-17T08:28:10Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319620336 ; | en_US |
dc.identifier.isbn | 3319620339 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1367 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Original ; 3319620320 ; 9783319620329 ; (OCoLC)990020536 ; | en_US |
dc.description.abstract | This book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities ; | en_US |
dc.description.statementofresponsibility | edited by Jonathan Anderson, Vashek Matyeeee, Bruce Christianson, Frank Stajano (eds.) | en_US |
dc.description.tableofcontents | Evolving Security -- Considering that security protocols evolve -- Changing requirements -- Changing mechanisms -- Attackers' changing agendas and capabilities ; | en_US |
dc.format.extent | 1 online resource (x, 233 pages) : ; illustrations ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10368 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10368. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319620336.pdf | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.title | Security protocols XXIV : | en_US |
dc.title.alternative | 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers / | en_US |
dc.title.alternative | Security protocols 24 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319620336.pdf | 6 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | International Workshop on Security Protocols ; (24th : ; 2016 : ; Brno, Czech Republic) ; | en_US |
dc.contributor.author | Anderson, Jonathan ; (Computer scientist), ; editor ; | en_US |
dc.contributor.author | Matyeesee, Vashek, ; editor ; | en_US |
dc.contributor.author | Christianson, Bruce, ; editor ; | en_US |
dc.contributor.author | Stajano, Frank, ; editor ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:28:10Z | - |
dc.date.available | 2020-05-17T08:28:10Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319620336 ; | en_US |
dc.identifier.isbn | 3319620339 ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1367 | - |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | Available to OhioLINK libraries ; | en_US |
dc.description | Ohio Library and Information Network ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Original ; 3319620320 ; 9783319620329 ; (OCoLC)990020536 ; | en_US |
dc.description.abstract | This book constitutes the thoroughly refereed post-workshop proceedings of the 24 th International Workshop on Securit Protocols, held in Brno, Czech Republic, in April 2016. The 13 thoroughly revised papers presented together with the respective transcripts of discussions have been carefully reviewed. The theme of the workshop was Evolving Security - considering that security protocols evolve with their changing requirements, their changing mechanisms and attackers' changing agendas and capabilities ; | en_US |
dc.description.statementofresponsibility | edited by Jonathan Anderson, Vashek Matyeeee, Bruce Christianson, Frank Stajano (eds.) | en_US |
dc.description.tableofcontents | Evolving Security -- Considering that security protocols evolve -- Changing requirements -- Changing mechanisms -- Attackers' changing agendas and capabilities ; | en_US |
dc.format.extent | 1 online resource (x, 233 pages) : ; illustrations ; | en_US |
dc.format.extent | Includes author index ; | en_US |
dc.publisher | Springer, | en_US |
dc.relation.ispartofseries | Lecture notes in computer science, ; 0302-9743 ; ; 10368 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. SL 4, Security and cryptology ; | en_US |
dc.relation.ispartofseries | Lecture notes in computer science ; ; 10368. ; 0302-9743 ; | en_US |
dc.relation.ispartofseries | LNCS sublibrary. ; SL 4, ; Security and cryptology ; | en_US |
dc.relation.haspart | 9783319620336.pdf | en_US |
dc.subject | Computer security ; Congresses ; | en_US |
dc.title | Security protocols XXIV : | en_US |
dc.title.alternative | 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised selected papers / | en_US |
dc.title.alternative | Security protocols 24 ; | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319620336.pdf | 6 MB | Adobe PDF | Preview File |