1 research outputs found
Remodelling the attacker : (transcript of discussion)
The original publication is available at www.springerlink.com Copyright Springer [Full text of this transcript is not available in the UHRA]Welcome to the 16th Security Protocols Workshop, or the XVIth Workshop for those of you still think in Latin, and consequently don't regard IP6 as an advance over IPv1. Our theme this year, the Mornington Crescent of protocol design, is Remodelling the Attacker.Peer reviewe