Making Decryption Accountable (Transcript of Discussion)

被引:0
|
作者
Ryan, Mark D. [1 ]
机构
[1] Univ Birmingham, Birmingham, W Midlands, England
来源
SECURITY PROTOCOLS XXV | 2017年 / 10476卷
关键词
D O I
10.1007/978-3-319-71075-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:99 / 108
页数:10
相关论文
共 50 条
  • [21] Making peer review statistically accountable
    Lee, JT
    [J]. AMERICAN JOURNAL OF SURGERY, 1996, 172 (02): : 222 - 224
  • [22] UKRAINE - MAKING STATE MANAGERS ACCOUNTABLE
    不详
    [J]. INTERNATIONAL LABOUR REVIEW, 1993, 132 (04) : 427 - 427
  • [23] MAKING MARKETING-RESEARCH ACCOUNTABLE
    GANDZ, J
    WHIPPLE, TW
    [J]. JOURNAL OF MARKETING RESEARCH, 1977, 14 (02) : 202 - 208
  • [24] Making peer review statistically accountable
    Scher, KS
    ScottConner, CEH
    [J]. AMERICAN JOURNAL OF SURGERY, 1996, 171 (04): : 441 - 444
  • [25] MAKING LANDLORDS ACCOUNTABLE FOR CAM CHARGES
    NEWMAN, JH
    [J]. REAL ESTATE REVIEW, 1994, 23 (04): : 72 - 75
  • [26] Derailing Attacks (Transcript of Discussion)
    Dashti, Mohammad Torabi
    [J]. SECURITY PROTOCOLS XXIII, 2015, 9379 : 47 - 49
  • [27] Invisible Security (Transcript of Discussion)
    Bella, Giampaolo
    [J]. SECURITY PROTOCOLS XXIV, 2017, 10368 : 10 - 18
  • [28] Security is Beautiful (Transcript of Discussion)
    Vigano, Luca
    [J]. SECURITY PROTOCOLS XXIII, 2015, 9379 : 251 - 260
  • [29] Beyond Trust (Transcript of Discussion)
    Das Chowdhury, Partha
    [J]. SECURITY PROTOCOLS XXII, 2014, 8809 : 345 - 349
  • [30] Performance of protocols (Transcript of discussion)
    Roe, M
    Lee, S
    Christianson, B
    Anderson, R
    Wheeler, D
    Blaze, M
    Gollman, D
    Gligor, V
    Mao, WB
    Paulson, L
    Kuhn, M
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 147 - 152