dc.contributor.author | Christianson, B. | |
dc.date.accessioned | 2011-12-21T11:01:05Z | |
dc.date.available | 2011-12-21T11:01:05Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Christianson , B 2011 , ' Remodelling the attacker : (transcript of discussion) ' , Lecture Notes in Computer Science (LNCS) , vol. 6615 , pp. 1-2 . https://doi.org/10.1007/978-3-642-22137-8_1 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/2299/7453 | |
dc.description | The original publication is available at www.springerlink.com Copyright Springer [Full text of this transcript is not available in the UHRA] | |
dc.description.abstract | Welcome to the 16th Security Protocols Workshop, or the XVIth Workshop for those of you still think in Latin, and consequently don't regard IP6 as an advance over IPv1. Our theme this year, the Mornington Crescent of protocol design, is Remodelling the Attacker. | en |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (LNCS) | |
dc.subject | protocol design | |
dc.subject | security protocols | |
dc.title | Remodelling the attacker : (transcript of discussion) | en |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1007/978-3-642-22137-8_1 | |
rioxxterms.type | Other | |
herts.preservation.rarelyaccessed | true | |