Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9379)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: Security Protocols 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents(36 papers)
Other volumes
-
Security Protocols XXIII
About this book
This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact".
Editors and Affiliations
-
University of Hertfordshire, Hatfield, United Kingdom
Bruce Christianson, James Malcolm
-
Faculty of Informatics, Masaryk University, Brno, Czech Republic
Petr Švenda, Vashek Matyáš
-
University of Cambridge, Cambridge, United Kingdom
Frank Stajano
-
Memorial University of Newfoundland, St. John's, Canada
Jonathan Anderson
Bibliographic Information
Book Title: Security Protocols XXIII
Book Subtitle: 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers
Editors: Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-26096-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-26095-2Published: 25 November 2015
eBook ISBN: 978-3-319-26096-9Published: 24 November 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XI, 367
Number of Illustrations: 38 illustrations in colour
Topics: Systems and Data Security, Cryptology, Management of Computing and Information Systems, Computer Communication Networks