Security Protocol Deployment Risk (Transcript of Discussion)

被引:0
|
作者
Christianson, Bruce [1 ]
机构
[1] Univ Hertfordshire, Hatfield AL10 9AB, Herts, England
来源
SECURITY PROTOCOLS XVI | 2011年 / 6615卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:21 / 24
页数:4
相关论文
共 50 条
  • [1] Security Protocol Deployment Risk
    Foley, Simon N.
    Bella, Giampaolo
    Bistarelli, Stefano
    [J]. SECURITY PROTOCOLS XVI, 2011, 6615 : 12 - +
  • [2] Invisible Security (Transcript of Discussion)
    Bella, Giampaolo
    [J]. SECURITY PROTOCOLS XXIV, 2017, 10368 : 10 - 18
  • [3] Security is Beautiful (Transcript of Discussion)
    Vigano, Luca
    [J]. SECURITY PROTOCOLS XXIII, 2015, 9379 : 251 - 260
  • [4] PIM security - (Transcript of discussion)
    Gollmann, D
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 82 - 86
  • [5] Incentives in Security Protocols (Transcript of Discussion)
    Murdoch, Steven J.
    [J]. SECURITY PROTOCOLS XXVI, 2018, 11286 : 142 - 149
  • [6] Intentionality and Agency in Security (Transcript of Discussion)
    Krol, Kat
    [J]. SECURITY PROTOCOLS XXVI, 2018, 11286 : 126 - 131
  • [7] The Metaplace Security Model (Transcript of Discussion)
    Roe, Michael
    [J]. SECURITY PROTOCOLS XIX, 2011, 7114 : 327 - 335
  • [8] Simulating Perceptions of Security (Transcript of Discussion)
    Wernick, Paul
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 69 - 75
  • [9] When Is a Protocol Broken? (Transcript of Discussion)
    Christianson, Bruce
    [J]. SECURITY PROTOCOLS, 2010, 5964 : 1 - 2
  • [10] A Security Perspective on Publication Metrics (Transcript of Discussion)
    Jonker, Hugo
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 201 - 213