Show simple item record

dc.contributor.authorChristianson, B.
dc.date.accessioned2011-12-21T11:01:05Z
dc.date.available2011-12-21T11:01:05Z
dc.date.issued2011
dc.identifier.citationChristianson , B 2011 , ' Remodelling the attacker : (transcript of discussion) ' , Lecture Notes in Computer Science (LNCS) , vol. 6615 , pp. 1-2 . https://doi.org/10.1007/978-3-642-22137-8_1
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 344248
dc.identifier.otherPURE UUID: 8509dc62-6cee-4c4c-8889-872c3cd0b392
dc.identifier.otherScopus: 79960277919
dc.identifier.urihttp://hdl.handle.net/2299/7453
dc.descriptionThe original publication is available at www.springerlink.com Copyright Springer [Full text of this transcript is not available in the UHRA]
dc.description.abstractWelcome to the 16th Security Protocols Workshop, or the XVIth Workshop for those of you still think in Latin, and consequently don't regard IP6 as an advance over IPv1. Our theme this year, the Mornington Crescent of protocol design, is Remodelling the Attacker.en
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS)
dc.subjectprotocol design
dc.subjectsecurity protocols
dc.titleRemodelling the attacker : (transcript of discussion)en
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.versionofrecordhttps://doi.org/10.1007/978-3-642-22137-8_1
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record