Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security protocols XXVII = 27th Inte...
~
Anderson, Jonathan.
Linked to FindBook
Google Book
Amazon
博客來
Security protocols XXVII = 27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security protocols XXVII/ edited by Jonathan Anderson ... [et al.].
Reminder of title:
27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
remainder title:
Security protocols 27
other author:
Anderson, Jonathan.
Published:
Cham :Springer International Publishing : : 2020.,
Description:
ix, 313 p. :ill., digital ;24 cm.
[NT 15003449]:
Designing for humans -- Fresh perspectives -- Human limitations in security -- Secure sharing and collaboration -- Is the future finally arriving? -- Evidence of humans behaving badly -- Warnings.
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-3-030-57043-9
ISBN:
9783030570439
Security protocols XXVII = 27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
Security protocols XXVII
27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /[electronic resource] :Security protocols 27edited by Jonathan Anderson ... [et al.]. - Cham :Springer International Publishing :2020. - ix, 313 p. :ill., digital ;24 cm. - Lecture notes in computer science,122870302-9743 ;. - Lecture notes in computer science ;12287..
Designing for humans -- Fresh perspectives -- Human limitations in security -- Secure sharing and collaboration -- Is the future finally arriving? -- Evidence of humans behaving badly -- Warnings.
The volume LNCS 12287 constitutes the proceedings of the 27th International Workshop on Security Protocols, held in Cambridge, UK, in April 2019. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was "Security Protocols for Humans" The topics covered included Designing for Humans and Understanding Humans, Human Limitations in Security, Secure sharing and collaboration and much more.
ISBN: 9783030570439
Standard No.: 10.1007/978-3-030-57043-9doiSubjects--Topical Terms:
590548
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security protocols XXVII = 27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
LDR
:01888nmm a2200361 a 4500
001
2255810
003
DE-He213
005
20200820135532.0
006
m d
007
cr nn 008maaau
008
220420s2020 sz s 0 eng d
020
$a
9783030570439
$q
(electronic bk.)
020
$a
9783030570422
$q
(paper)
024
7
$a
10.1007/978-3-030-57043-9
$2
doi
035
$a
978-3-030-57043-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S446 2020
245
0 0
$a
Security protocols XXVII
$h
[electronic resource] :
$b
27th International Workshop, Cambridge, UK, April 10-12, 2019 : revised selected papers /
$c
edited by Jonathan Anderson ... [et al.].
246
3
$a
Security protocols 27
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
ix, 313 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12287
490
1
$a
Security and cryptology
505
0
$a
Designing for humans -- Fresh perspectives -- Human limitations in security -- Secure sharing and collaboration -- Is the future finally arriving? -- Evidence of humans behaving badly -- Warnings.
520
$a
The volume LNCS 12287 constitutes the proceedings of the 27th International Workshop on Security Protocols, held in Cambridge, UK, in April 2019. The volume consists of 16 thoroughly revised invited papers presented together with the respective transcripts of discussions. The theme of this year's workshop was "Security Protocols for Humans" The topics covered included Designing for Humans and Understanding Humans, Human Limitations in Security, Secure sharing and collaboration and much more.
650
0
$a
Data protection.
$3
590548
650
0
$a
Computer networks.
$3
539554
650
0
$a
Computers and civilization.
$3
524981
650
0
$a
Application software.
$3
527258
650
0
$a
User interfaces (Computer systems)
$3
539550
650
0
$a
Software engineering.
$3
559826
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computers and Society.
$3
891253
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
User Interfaces and Human Computer Interaction.
$3
892554
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
891214
700
1
$a
Anderson, Jonathan.
$3
1029957
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
12287.
$3
3525580
830
0
$a
Security and cryptology.
$3
3382517
856
4 0
$u
https://doi.org/10.1007/978-3-030-57043-9
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9411446
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login