Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorAura, T
dc.contributor.authorWheeler, D
dc.contributor.authorHarbison, W
dc.contributor.authorGligor, V
dc.contributor.authorPaulson, L
dc.contributor.authorBlaze, M
dc.contributor.authorIoannidis, J
dc.date.accessioned2012-02-14T15:00:55Z
dc.date.available2012-02-14T15:00:55Z
dc.date.issued2002
dc.identifier.citationChristianson , B , Aura , T , Wheeler , D , Harbison , W , Gligor , V , Paulson , L , Blaze , M & Ioannidis , J 2002 , ' Concluding discussion - When does confidentiality harm security? ' , Lecture Notes in Computer Science (LNCS) including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics , vol. 2467 , pp. 229-238 . https://doi.org/10.1007/3-540-45807-7_33
dc.identifier.issn0302-9743
dc.identifier.otherPURE: 337987
dc.identifier.otherPURE UUID: e09f4a01-5c06-41d9-9e64-9379152efe4c
dc.identifier.otherWOS: 000189122700033
dc.identifier.otherScopus: 84958762003
dc.identifier.urihttp://hdl.handle.net/2299/7806
dc.description.abstractBruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done.en
dc.format.extent10
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS) including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
dc.titleConcluding discussion - When does confidentiality harm security?en
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.versionofrecordhttps://doi.org/10.1007/3-540-45807-7_33
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record