Remodelling the attacker: (transcript of discussion)

    Research output: Contribution to journalComment/debatepeer-review

    Abstract

    Welcome to the 16th Security Protocols Workshop, or the XVIth Workshop for those of you still think in Latin, and consequently don't regard IP6 as an advance over IPv1. Our theme this year, the Mornington Crescent of protocol design, is Remodelling the Attacker.
    Original languageEnglish
    Pages (from-to)1-2
    JournalLecture Notes in Computer Science (LNCS)
    Volume6615
    DOIs
    Publication statusPublished - 2011

    Keywords

    • protocol design
    • security protocols

    Fingerprint

    Dive into the research topics of 'Remodelling the attacker: (transcript of discussion)'. Together they form a unique fingerprint.

    Cite this