Editors:
Up-to-date results
Fast-track conference proceedings
State-of-the-art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6615)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols
Conference proceedings info: Security Protocols 2008.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (34 papers)
-
Front Matter
About this book
Keywords
- adversary modeling
- anonymity
- authentication
- cyber attacks
- electronic voting
- internet warfare
- key management protocols
- network security
- privacy
- secure multi-party protocols
Editors and Affiliations
-
Computer Science Department, University of Hertfordshire, Hatfield, UK
Bruce Christianson, James A. Malcolm, Michael Roe
-
Faculty of Informatics, Masaryk University, Brno, Czech Republic
Vashek Matyas
Bibliographic Information
Book Title: Security Protocols XVI
Book Subtitle: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
Editors: Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-22137-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag GmbH Berlin Heidelberg 2011
Softcover ISBN: 978-3-642-22136-1Published: 01 July 2011
eBook ISBN: 978-3-642-22137-8Published: 01 July 2011
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: IX, 257
Topics: Cryptology, Computer Communication Networks, IT Operations, Operating Systems, Computer and Information Systems Applications, Legal Aspects of Computing