Tipo de artículo
Condición
Encuadernación
Más atributos
Gastos de envío gratis
Ubicación del vendedor
Valoración de los vendedores
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: booksXpress, Bayonne, NJ, Estados Unidos de America
Libro
Soft Cover. Condición: new.
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
Libro
Condición: New.
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Libro
Condición: New.
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
Libro
Condición: As New. Unread book in perfect condition.
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: Ria Christie Collections, Uxbridge, Reino Unido
Libro Impresión bajo demanda
Condición: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book.
Publicado por Springer Berlin Heidelberg Jan 2004, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Libro Impresión bajo demanda
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was 'Discerning the Protocol Participants.' Security protocols are usually described in terms of the active participants - Alice c- putes foo and sends it to Bob. However most security protocols also include o -line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add Do let us know. 256 pp. Englisch.
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: GreatBookPricesUK, Castle Donington, DERBY, Reino Unido
Libro
Condición: New.
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Libro
Condición: New.
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: GreatBookPricesUK, Castle Donington, DERBY, Reino Unido
Libro
Condición: As New. Unread book in perfect condition.
Publicado por Springer Berlin Heidelberg, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Libro
Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was 'Discerning the Protocol Participants.' Security protocols are usually described in terms of the active participants - Alice c- putes foo and sends it to Bob. However most security protocols also include o -line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add Do let us know.
Publicado por Springer 2004-01, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: Chiron Media, Wallingford, Reino Unido
Libro
PF. Condición: New.
Publicado por Springer Berlin Heidelberg, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: moluna, Greven, Alemania
Libro
Kartoniert / Broschiert. Condición: New.
Publicado por Springer, 2004
ISBN 10: 3540208305ISBN 13: 9783540208303
Librería: Kennys Bookstore, Olney, MD, Estados Unidos de America
Libro
Condición: New.