I was extremely happy to see this year's theme. In 2005 I had a talk here about redefining the adversary, and I still believe that that's a good topic to think about. Let me first say a few words about the adversary, and whoever gets whom I am paraphrasing will win a beer. A system without a definition cannot possibly be insecure, it can only be astonishing, and of course astonishment is a much under-rated security vice. © 2011 Springer-Verlag.
CITATION STYLE
Gligor, V. D. (2011). Handling new adversaries in wireless ad-hoc networks (transcript of discussion). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6615 LNCS, pp. 120–125). https://doi.org/10.1007/978-3-642-22137-8_18
Mendeley helps you to discover research relevant for your work.