Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Automated Reasoning for Securi...
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010, Revised Selected Papers / edited by Alessandro Armando, Gavin Lowe.
Saved in:
Bibliographic Details
Corporate Author:
SpringerLink (Online service)
Other Authors:
Armando, Alessandro
(Editor)
,
Lowe, Gavin
(Editor)
Format:
eBook
Language:
English
Published:
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
Edition:
1st ed. 2010.
Series:
Security and Cryptology ;
6186
Springer eBook Collection.
Subjects:
Data encryption (Computer science).
Computer communication systems.
Computers and civilization.
Algorithms.
Software engineering.
Programming languages (Electronic computers).
Electronic resources (E-books)
Online Access:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Holdings
Description
Similar Items
Staff View
Similar Items
Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
Published: (2009)
Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
Published: (2014)
Security Protocols 9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers
Published: (2002)
Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers
Published: (2006)
Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Published: (2007)
Security Protocols 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers
Published: (2004)
Security Protocols XIX 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers
Published: (2011)
Security Protocols 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers
Published: (2005)
Security Protocols 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings
Published: (1999)
Security Protocols 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings
Published: (2000)
Security Protocols 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers
Published: (2010)
Security Protocols 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
Published: (1998)
Security Protocols 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers
Published: (2001)
Security Protocols International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings
Published: (1997)
Security Protocols XX 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers
Published: (2012)
Security Protocols 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers
Published: (2009)
Security Protocols 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers
Published: (2013)
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
Published: (2011)
Radio Frequency Identification: Security and Privacy Issues 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers
Published: (2010)
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
Published: (2011)
Security of block ciphers : from algorithm design to hardware implementation
by: Sakiyama, Kazuo, 1971-
Published: (2015)
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
Published: (2011)
Computer Security - ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings
Published: (2010)
Security and Cryptography for Networks 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings
Published: (2010)
Provable Security 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings
Published: (2010)
Security Protocols XXV 25th International Workshop, Cambridge, UK, March 20–22, 2017, Revised Selected Papers
Published: (2017)
Automated Security Management
Published: (2013)
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, Proceedings
Published: (2010)
Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers
Published: (2014)
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers
Published: (2009)
Theory of Security and Applications Joint Workshop, TOSCA 2011, Saarbrücken, Germany,March 31-April 1, 2011, Revised Selected Papers
Published: (2012)
Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010, Proceedings
Published: (2010)
Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers
Published: (2010)
Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010, Proceedings
Published: (2010)
Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers
Published: (2015)
Security and Privacy - Silver Linings in the Cloud 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010, Proceedings
Published: (2010)
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers
Published: (2011)
Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings
Published: (2010)
Advances in Information and Computer Security 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings
Published: (2015)
Security and Privacy in Communication Networks 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings
Published: (2010)
Prev
Next
Similar Items
Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
Published: (2009)
Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
Published: (2014)
Security Protocols 9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers
Published: (2002)
Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers
Published: (2006)
Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Published: (2007)