“Assumptions: The Trojan Horses of Secure Protocols”
From Navigators
in In V. Gorodetsky, I. Kotenko, and V.A. Skormin (Eds.): "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS) 2007, CCIS 1, pp. 34-41, 2007. Springer-Verlag., Sept. 2007.
Abstract: —
Download paper
Download Assumptions: The Trojan Horses of Secure Protocols
Export citation
Project(s): Project:CRUTIAL
Research line(s): Fault And Intrusion Tolerance in Open Distributed Systems (FIT)