Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings by Bruce ChristiansonSecurity Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings by Bruce Christianson

Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings

byBruce ChristiansonEditorBruno Crispo

Paperback | April 24, 1992

Pricing and Purchase Info

$92.97 online 
$110.50 list price save 15%
Earn 465 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.
Title:Security Protocols: 5th International Workshop, Paris, France, April 7-9, 1997, ProceedingsFormat:PaperbackDimensions:220 pages, 23.5 × 15.5 × 0.1 inPublished:April 24, 1992Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540640401

ISBN - 13:9783540640400

Reviews

Table of Contents

The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.

From Our Editors

Security Protocols constitutes the refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in 1997. This collection of 17 revised papers addresses all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryptographic protocols, authentication, threshold systems, and secret sharing.