Instructions to reviewers

0Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Thank-you for agreeing to act as a reviewer for the Security Protocols Workshop. Please follow these five (5) simple steps: 1Send your position paper to the person whose name appears at the top of the list below.2Remove the first name on the list and add your own name and address at the bottom.3Make sixteen (16) copies of the resulting letter.4Choose the sixteen (16) people whom you believe should be invited to submit position papers to the workshop, and send them each one copy.5Within a month, you should receive approximately 65,536 position papers to review, at least some of which are bound to be crackers.DO NOT BREAK THE CHAIN. One reviewer did, and ended up reviewing his own submission by mistake. He rejected it!6Please complete all your reviews by Feb 15.

Cite

CITATION STYLE

APA

Christianson, B., Crispo, B., Malcolm, J., & Roe, M. (2010). Instructions to reviewers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5964 LNCS, p. 256). Springer Verlag. https://doi.org/10.1007/978-3-642-17773-6_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free