“Assumptions: The Trojan Horses of Secure Protocols”

From Navigators

Jump to: navigation, search

Paulo Veríssimo

in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.

Abstract:

Download paper

Download Assumptions: The Trojan Horses of Secure Protocols

Export citation

BibTeX

Project(s): Project:CRUTIAL

Research line(s): Fault And Intrusion Tolerance in Open Distributed Systems (FIT)

Personal tools
Navigators toolbox