End to End Security is Not Enough (Transcript of Discussion)

被引:0
|
作者
Clarke, Dylan [1 ]
机构
[1] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
来源
SECURITY PROTOCOLS XXV | 2017年 / 10476卷
关键词
D O I
10.1007/978-3-319-71075-4_30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:268 / 277
页数:10
相关论文
共 50 条
  • [1] End to End Security is Not Enough
    Clarke, Dylan
    Ali, Syed Taha
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 260 - 267
  • [2] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [3] Invisible Security (Transcript of Discussion)
    Bella, Giampaolo
    [J]. SECURITY PROTOCOLS XXIV, 2017, 10368 : 10 - 18
  • [4] Security is Beautiful (Transcript of Discussion)
    Vigano, Luca
    [J]. SECURITY PROTOCOLS XXIII, 2015, 9379 : 251 - 260
  • [5] Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
    Zhang, Jialei
    Yan, Zheng
    Fei, Shufan
    Wang, Mingjun
    Li, Tieyan
    Wang, Haiguang
    [J]. IEEE NETWORK, 2022, 36 (01): : 105 - 112
  • [6] PIM security - (Transcript of discussion)
    Gollmann, D
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 82 - 86
  • [7] End of discussion
    不详
    [J]. NEW REPUBLIC, 2004, 231 (22-23) : 9 - 9
  • [8] THE END OF DISCUSSION
    不详
    [J]. NEW REPUBLIC, 1989, 201 (21) : 7 - 8
  • [9] Incentives in Security Protocols (Transcript of Discussion)
    Murdoch, Steven J.
    [J]. SECURITY PROTOCOLS XXVI, 2018, 11286 : 142 - 149
  • [10] Intentionality and Agency in Security (Transcript of Discussion)
    Krol, Kat
    [J]. SECURITY PROTOCOLS XXVI, 2018, 11286 : 126 - 131