dc.contributor.author | Shafarenko, A. | |
dc.date.accessioned | 2010-01-28T11:37:54Z | |
dc.date.available | 2010-01-28T11:37:54Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Shafarenko , A 2009 , ' Vintage bit cryptography. (Transcript of discussion) ' , Lecture Notes in Computer Science (LNCS) , vol. 5087 , pp. 266-275 . https://doi.org/10.1007/978-3-642-04904-0 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | dspace: 2299/4195 | |
dc.identifier.uri | http://hdl.handle.net/2299/4195 | |
dc.description | “The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this paper is not available in the UHRA] | |
dc.description.abstract | This may be a highly controversial talk, because this is an area where things are periodically rediscovered. But in the process of reinventing it, I think we’ve found a few interesting protocol issues, and a few interesting technological issues, which make it worth revisiting. | en |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (LNCS) | |
dc.title | Vintage bit cryptography. (Transcript of discussion) | en |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.contributor.institution | Cybersecurity and Computing Systems | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1007/978-3-642-04904-0 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |