Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers / [electronic resource] : edited by Bruce Christianson, James A. Malcolm, Vashek Matyáš, Michael Roe. - Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. - 1 online resource (X, 367 p. 28 ill.) - Lecture Notes in Computer Science, 7028 0302-9743 ; .

Evolutionary design of attack strategies -- Below the salt -- Attacking each other -- Bringing zero-knowledge proofs of knowledge to practice -- Towards a verified reference implementation of a trusted platform module -- Pretty good democracy -- Brief encounters with a random key graph -- Why I'm not an entropist -- A novel stateless authentication protocol -- Establishing distributed hidden friendship relations -- The final word.

9783642362132


Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers.
Law and legislation.
Management information systems.