- 5 Results
Lowest price: € 13.98, highest price: € 80.96, average price: € 55.57
1
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers: 6615 (Lecture Notes in Computer Science, 6615)
Order
at amazon.co.uk
£ 29.44
(aprox. € 34.46)
Shipment: € 5.621
OrderSponsored link

Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers: 6615 (Lecture Notes in Computer Science, 6615) - Paperback

2011, ISBN: 9783642221361

Editor: Christianson, Bruce, Editor: Malcolm, James, Editor: Matyas, Vashek, Editor: Roe, Michael, Springer, Paperback, Auflage: 2011, 266 Seiten, Publiziert: 2011-07-01T00:00:01Z, Produk… More...

Shipping costs:In stock. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 5.62) bookpark london
2
Security Protocols XVI - Christianson, Bruce Malcolm, James Matyas, Vashek Roe, Michael
Order
at booklooker.de
€ 77.95
Shipment: € 0.001
OrderSponsored link

Christianson, Bruce Malcolm, James Matyas, Vashek Roe, Michael:

Security Protocols XVI - Paperback

2011, ISBN: 9783642221361

[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Up-to-date results Fast-t… More...

Shipping costs:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Moluna GmbH
3
Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers - Christianson, Bruce, James Malcolm und Vashek Matyas
Order
at ZVAB.com
€ 13.98
Shipment: € 35.001
OrderSponsored link
Christianson, Bruce, James Malcolm und Vashek Matyas:
Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers - Paperback

2011

ISBN: 364222136X

[EAN: 9783642221361], Usato, buono stato, [SC: 35.0], [PU: Springer Berlin], NETWORK SECURITY,KEY MANAGEMENT PROTOCOLS,SECURE MULTI-PARTY PROTOCOLS,AUTHENTICATION,CYBER ATTACKS,ANONYMITY,… More...

NOT NEW BOOK. Shipping costs: EUR 35.00 Buchpark, Trebbin, Germany [83435977] [Rating: 5 (su 5)]
4
Order
at alibris.co.uk
€ 70.51
OrderSponsored link
Bruce Christianson:
Security Protocols XVI 16th International Workshop, Cambridge, Uk, April 1618, 2008 Revised Selected Papers 6615 Lecture Notes in Computer Science - Paperback

2007, ISBN: 9783642221361

Softcover, New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from the UK., [PU: Springer]

Shipping costs:plus shipping costs Glendale Heights, IL, Paperbackshop
5
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Lecture Notes in Computer Science) [Soft Cover ]
Order
at AbeBooks.de
€ 80.96
Shipment: € 8.211
OrderSponsored link
Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Lecture Notes in Computer Science) [Soft Cover ] - Paperback

2011, ISBN: 364222136X

[EAN: 9783642221361], Neubuch, [PU: Springer], Books

NEW BOOK. Shipping costs: EUR 8.21 booksXpress, Freehold, NJ, U.S.A. [71410708] [Rating: 4 (von 5)]

1As some platforms do not transmit shipping conditions to us and these may depend on the country of delivery, the purchase price, the weight and size of the item, a possible membership of the platform, a direct delivery by the platform or via a third-party provider (Marketplace), etc., it is possible that the shipping costs indicated by euro-book.co.uk / euro-book.co.uk do not correspond to those of the offering platform.

Bibliographic data of the best matching book

Details of the book

Details of the book - Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers: 6615 (Lecture Notes in Computer Science, 6615)


EAN (ISBN-13): 9783642221361
ISBN (ISBN-10): 364222136X
Hardcover
Paperback
Publishing year: 2008
Publisher: Springer
255 Pages
Weight: 0,421 kg
Language: Englisch

Book in our database since 2009-05-15T10:46:18+01:00 (London)
Detail page last modified on 2023-09-08T15:09:28+01:00 (London)
ISBN/EAN: 364222136X

ISBN - alternate spelling:
3-642-22136-X, 978-3-642-22136-1
Alternate spelling and related search-keywords:
Book author: christianson, james, bruce michael, christians, malcolm, maty, matyas
Book title: papers


Information from Publisher

Author: Bruce Christianson; James Malcolm; Vashek Matyas; Michael Roe
Title: Lecture Notes in Computer Science; Security and Cryptology; Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers
Publisher: Springer; Springer Berlin
257 Pages
Publishing year: 2011-07-01
Berlin; Heidelberg; DE
Printed / Made in
Language: English
53,49 € (DE)
54,99 € (AT)
67,13 CHF (CH)
POD
IX, 257 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; adversary modeling; anonymity; authentication; cyber attacks; electronic voting; internet warfare; key management protocols; network security; privacy; secure multi-party protocols; Cryptology; Computer Communication Networks; IT Operations; Operating Systems; Computer and Information Systems Applications; Legal Aspects of Computing; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Betriebssysteme; Angewandte Informatik; Digital- und Informationstechnologien: Rechtliche Aspekte; EA

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was “Remodelling the Attacker” with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn’t the attacker’s capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.
Up-to-date results Fast-track conference proceedings State-of-the-art research

< to archive...