dc.contributor.author | Christianson, B. | |
dc.contributor.author | Aura, T | |
dc.contributor.author | Wheeler, D | |
dc.contributor.author | Harbison, W | |
dc.contributor.author | Gligor, V | |
dc.contributor.author | Paulson, L | |
dc.contributor.author | Blaze, M | |
dc.contributor.author | Ioannidis, J | |
dc.date.accessioned | 2012-02-14T15:00:55Z | |
dc.date.available | 2012-02-14T15:00:55Z | |
dc.date.issued | 2002 | |
dc.identifier.citation | Christianson , B , Aura , T , Wheeler , D , Harbison , W , Gligor , V , Paulson , L , Blaze , M & Ioannidis , J 2002 , ' Concluding discussion - When does confidentiality harm security? ' , Lecture Notes in Computer Science (LNCS) , vol. 2467 , pp. 229-238 . https://doi.org/10.1007/3-540-45807-7_33 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/2299/7806 | |
dc.description.abstract | Bruce Christianson: We’ve just about got to the point now where we can see how real communities could actually achieve genuinely secure end-to-end confidentiality in a heterogeneous dynamic mobile environment. That’s still a slightly contentious statement. There are some people who say that not all of the details of every protocol you’d need to do that are understood. But I think we’re pretty much at the point where we can see what would have to be done. | en |
dc.format.extent | 10 | |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (LNCS) | |
dc.title | Concluding discussion - When does confidentiality harm security? | en |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1007/3-540-45807-7_33 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |