“Assumptions: The Trojan Horses of Secure Protocols”

From Navigators

(Difference between revisions)
Jump to: navigation, search
Jcraveiro (Talk | contribs)
(NavsPubsFull5.xml import (201201141459, full reimport with new ids for legacy pubs avoiding collisions))

Latest revision as of 14:41, 14 January 2013

Paulo Veríssimo

in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.

Abstract:

Download paper

Download Assumptions: The Trojan Horses of Secure Protocols

Export citation

BibTeX

Project(s): Project:CRUTIAL

Research line(s): Fault And Intrusion Tolerance in Open Distributed Systems (FIT)

Navigators toolbox