Hello everyone, and welcome to the 15th International Security Protocols Workshop. I know that we're used to having these workshops in Cambridge, but we have a tradition that once every ten years we go to some far-off exotic place instead. The 5th Protocols Workshop was held in Paris, and now this being the 15th one, here we are in sunny Brno. The only credit I can claim for the excellence of the venue and all the arrangements, is that I made the decision to delegate all this to Vashek [Vaclav Matyas]. He and his team have worked extremely hard to do all the local arrangements, and I'm pathetically grateful to them. © 2010 Springer-Verlag.
CITATION STYLE
Christianson, B. (2010). When is a protocol broken? (transcript of discussion). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5964 LNCS, pp. 1–2). https://doi.org/10.1007/978-3-642-17773-6_1
Mendeley helps you to discover research relevant for your work.