Security Protocols XXV

25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security Protocols XXV by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319710754
Publisher: Springer International Publishing Publication: November 28, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319710754
Publisher: Springer International Publishing
Publication: November 28, 2017
Imprint: Springer
Language: English

This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017.

The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions.  The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of security, systems security, network security, software and application security, human and societal aspects of security and privacy, security protocols, web protocol security, and mobile and wireless security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017.

The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions.  The theme of this year's workshop was multi-objective security and the topics covered included security and privacy, formal methods and theory of security, systems security, network security, software and application security, human and societal aspects of security and privacy, security protocols, web protocol security, and mobile and wireless security.

More books from Springer International Publishing

Cover of the book Skull Base Surgery of the Posterior Fossa by
Cover of the book Strain Gradient Plasticity-Based Modeling of Damage and Fracture by
Cover of the book Biogeography of Mycorrhizal Symbiosis by
Cover of the book Uncertain Rule-Based Fuzzy Systems by
Cover of the book Differential and Difference Equations by
Cover of the book Context Aware Human-Robot and Human-Agent Interaction by
Cover of the book Discourse, Culture and Organization by
Cover of the book Prostate Cancer by
Cover of the book Context-Aware Systems and Applications, and Nature of Computation and Communication by
Cover of the book Internet and Distributed Computing Systems by
Cover of the book Heat Transfer Modeling by
Cover of the book Geospatial Technologies for All by
Cover of the book Long Term Evolution in Unlicensed Bands by
Cover of the book Future and Emerging Trends in Language Technology. Machine Learning and Big Data by
Cover of the book Melanin-Concentrating Hormone and Sleep by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy