This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in …