Handling new adversaries in wireless ad-hoc networks (transcript of discussion)

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

I was extremely happy to see this year's theme. In 2005 I had a talk here about redefining the adversary, and I still believe that that's a good topic to think about. Let me first say a few words about the adversary, and whoever gets whom I am paraphrasing will win a beer. A system without a definition cannot possibly be insecure, it can only be astonishing, and of course astonishment is a much under-rated security vice. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Gligor, V. D. (2011). Handling new adversaries in wireless ad-hoc networks (transcript of discussion). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6615 LNCS, pp. 120–125). https://doi.org/10.1007/978-3-642-22137-8_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free