“Assumptions: The Trojan Horses of Secure Protocols”
From Navigators
(Difference between revisions)
Jcraveiro (Talk | contribs)
(NavsPubsFull5.xml import (201201141459, full reimport with new ids for legacy pubs avoiding collisions))
(NavsPubsFull5.xml import (201201141459, full reimport with new ids for legacy pubs avoiding collisions))
Latest revision as of 14:41, 14 January 2013
in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.
Abstract: —
Download paper
Download Assumptions: The Trojan Horses of Secure Protocols
Export citation
Project(s): Project:CRUTIAL
Research line(s): Fault And Intrusion Tolerance in Open Distributed Systems (FIT)