Rational protocols

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology. © IFIP International Federation for Information Processing 2009.

Cite

CITATION STYLE

APA

Cachin, C. (2009). Rational protocols. In IFIP Advances in Information and Communication Technology (Vol. 309, pp. 93–94). https://doi.org/10.1007/978-3-642-05437-2_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free