Related Books
Language: en
Pages: 176
Pages: 176
Type: BOOK - Published: 2012-10-30 - Publisher: Springer Science & Business Media
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptogr
Language: en
Pages: 360
Pages: 360
Type: BOOK - Published: 2005-09-05 - Publisher: Springer Science & Business Media
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Security Protocols, held in Cambridge, UK, in April 2003. T
Language: en
Pages: 286
Pages: 286
Type: BOOK - Published: 1982 - Publisher:
Language: en
Pages: 343
Pages: 343
Type: BOOK - Published: 2013-03-09 - Publisher: Springer Science & Business Media
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, whi
Language: en
Pages: 315
Pages: 315
Type: BOOK - Published: 2018-11-23 - Publisher: Springer
This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in Marc