Remodelling the attacker: (transcript of discussion)

Research output: Contribution to journalComment/debatepeer-review

Abstract

Welcome to the 16th Security Protocols Workshop, or the XVIth Workshop for those of you still think in Latin, and consequently don't regard IP6 as an advance over IPv1. Our theme this year, the Mornington Crescent of protocol design, is Remodelling the Attacker.
Original languageEnglish
Pages (from-to)1-2
JournalLecture Notes in Computer Science (LNCS)
Volume6615
DOIs
Publication statusPublished - 2011

Keywords

  • protocol design
  • security protocols

Fingerprint

Dive into the research topics of 'Remodelling the attacker: (transcript of discussion)'. Together they form a unique fingerprint.

Cite this