Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorAura, T
dc.contributor.authorWheeler, D
dc.contributor.authorHarbison, W
dc.contributor.authorGligor, V
dc.contributor.authorPaulson, L
dc.contributor.authorBlaze, M
dc.contributor.authorIoannidis, J
dc.date.accessioned2012-02-14T15:00:55Z
dc.date.available2012-02-14T15:00:55Z
dc.date.issued2002
dc.identifier.citationChristianson , B , Aura , T , Wheeler , D , Harbison , W , Gligor , V , Paulson , L , Blaze , M & Ioannidis , J 2002 , ' Concluding discussion - When does confidentiality harm security? ' , Lecture Notes in Computer Science (LNCS) , vol. 2467 , pp. 229-238 . https://doi.org/10.1007/3-540-45807-7_33
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/2299/7806
dc.description.abstractBruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done.en
dc.format.extent10
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS)
dc.titleConcluding discussion - When does confidentiality harm security?en
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.versionofrecord10.1007/3-540-45807-7_33
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record