When is a protocol broken? (transcript of discussion)

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Hello everyone, and welcome to the 15th International Security Protocols Workshop. I know that we're used to having these workshops in Cambridge, but we have a tradition that once every ten years we go to some far-off exotic place instead. The 5th Protocols Workshop was held in Paris, and now this being the 15th one, here we are in sunny Brno. The only credit I can claim for the excellence of the venue and all the arrangements, is that I made the decision to delegate all this to Vashek [Vaclav Matyas]. He and his team have worked extremely hard to do all the local arrangements, and I'm pathetically grateful to them. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Christianson, B. (2010). When is a protocol broken? (transcript of discussion). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5964 LNCS, pp. 1–2). https://doi.org/10.1007/978-3-642-17773-6_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free