Analysing Applications Layered on Unilaterally Authenticating Protocols
Main Authors: | , |
---|---|
Format: | Conference item |
Published: |
2011
|
_version_ | 1797058369179090944 |
---|---|
author | Gibson−Robinson, T Lowe, G |
author_facet | Gibson−Robinson, T Lowe, G |
author_sort | Gibson−Robinson, T |
collection | OXFORD |
description | |
first_indexed | 2024-03-06T19:49:32Z |
format | Conference item |
id | oxford-uuid:237d87ff-c28d-4d24-9e1a-8ed99f06866c |
institution | University of Oxford |
last_indexed | 2024-03-06T19:49:32Z |
publishDate | 2011 |
record_format | dspace |
spelling | oxford-uuid:237d87ff-c28d-4d24-9e1a-8ed99f06866c2022-03-26T11:44:35ZAnalysing Applications Layered on Unilaterally Authenticating ProtocolsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:237d87ff-c28d-4d24-9e1a-8ed99f06866cDepartment of Computer Science2011Gibson−Robinson, TLowe, G |
spellingShingle | Gibson−Robinson, T Lowe, G Analysing Applications Layered on Unilaterally Authenticating Protocols |
title | Analysing Applications Layered on Unilaterally Authenticating Protocols |
title_full | Analysing Applications Layered on Unilaterally Authenticating Protocols |
title_fullStr | Analysing Applications Layered on Unilaterally Authenticating Protocols |
title_full_unstemmed | Analysing Applications Layered on Unilaterally Authenticating Protocols |
title_short | Analysing Applications Layered on Unilaterally Authenticating Protocols |
title_sort | analysing applications layered on unilaterally authenticating protocols |
work_keys_str_mv | AT gibsonrobinsont analysingapplicationslayeredonunilaterallyauthenticatingprotocols AT loweg analysingapplicationslayeredonunilaterallyauthenticatingprotocols |