Thank-you for agreeing to act as a reviewer for the Security Protocols Workshop. Please follow these five (5) simple steps: 1Send your position paper to the person whose name appears at the top of the list below.2Remove the first name on the list and add your own name and address at the bottom.3Make sixteen (16) copies of the resulting letter.4Choose the sixteen (16) people whom you believe should be invited to submit position papers to the workshop, and send them each one copy.5Within a month, you should receive approximately 65,536 position papers to review, at least some of which are bound to be crackers.DO NOT BREAK THE CHAIN. One reviewer did, and ended up reviewing his own submission by mistake. He rejected it!6Please complete all your reviews by Feb 15.
CITATION STYLE
Christianson, B., Crispo, B., Malcolm, J., & Roe, M. (2010). Instructions to reviewers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5964 LNCS, p. 256). Springer Verlag. https://doi.org/10.1007/978-3-642-17773-6_30
Mendeley helps you to discover research relevant for your work.