Deriving‚ attacking and defending the GDOI protocol

Bibliographic Details
Main Authors: Meadows, C, Pavlovic, D
Format: Conference item
Published: Springer Verlag 2004
_version_ 1797072525106085888
author Meadows, C
Pavlovic, D
author_facet Meadows, C
Pavlovic, D
author_sort Meadows, C
collection OXFORD
description
first_indexed 2024-03-06T23:08:57Z
format Conference item
id oxford-uuid:64d0c694-ff8a-4ec8-aaf0-31bb5ccbdb52
institution University of Oxford
last_indexed 2024-03-06T23:08:57Z
publishDate 2004
publisher Springer Verlag
record_format dspace
spelling oxford-uuid:64d0c694-ff8a-4ec8-aaf0-31bb5ccbdb522022-03-26T18:21:17ZDeriving‚ attacking and defending the GDOI protocolConference itemhttp://purl.org/coar/resource_type/c_5794uuid:64d0c694-ff8a-4ec8-aaf0-31bb5ccbdb52Department of Computer ScienceSpringer Verlag2004Meadows, CPavlovic, D
spellingShingle Meadows, C
Pavlovic, D
Deriving‚ attacking and defending the GDOI protocol
title Deriving‚ attacking and defending the GDOI protocol
title_full Deriving‚ attacking and defending the GDOI protocol
title_fullStr Deriving‚ attacking and defending the GDOI protocol
title_full_unstemmed Deriving‚ attacking and defending the GDOI protocol
title_short Deriving‚ attacking and defending the GDOI protocol
title_sort deriving attacking and defending the gdoi protocol
work_keys_str_mv AT meadowsc derivingattackinganddefendingthegdoiprotocol
AT pavlovicd derivingattackinganddefendingthegdoiprotocol