Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers / [electronic resource] :
edited by Bruce Christianson, James A. Malcolm, Vashek Matyáš, Michael Roe.
- Berlin, Heidelberg : Springer Berlin Heidelberg, 2013.
- 1 online resource (X, 367 p. 28 ill.)
- Lecture Notes in Computer Science, 7028 0302-9743 ; .
Evolutionary design of attack strategies -- Below the salt -- Attacking each other -- Bringing zero-knowledge proofs of knowledge to practice -- Towards a verified reference implementation of a trusted platform module -- Pretty good democracy -- Brief encounters with a random key graph -- Why I'm not an entropist -- A novel stateless authentication protocol -- Establishing distributed hidden friendship relations -- The final word.
9783642362132
Computer science. Computer communication systems. Computer security. Data encryption (Computer science). Computers. Law and legislation. Management information systems.