Security properties and mechanisms in human−centric computing
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Book |
Published: |
2004
|
_version_ | 1797073756628189184 |
---|---|
author | Creese, S Goldsmith, M Roscoe, A Zakiuddin, I |
author2 | Robinson, P |
author_facet | Robinson, P Creese, S Goldsmith, M Roscoe, A Zakiuddin, I |
author_sort | Creese, S |
collection | OXFORD |
description | |
first_indexed | 2024-03-06T23:26:36Z |
format | Book |
id | oxford-uuid:6a92e30f-96b6-4b24-8f8f-ef139122006a |
institution | University of Oxford |
last_indexed | 2024-03-06T23:26:36Z |
publishDate | 2004 |
record_format | dspace |
spelling | oxford-uuid:6a92e30f-96b6-4b24-8f8f-ef139122006a2022-03-26T18:58:25ZSecurity properties and mechanisms in human−centric computingBookhttp://purl.org/coar/resource_type/c_2f33uuid:6a92e30f-96b6-4b24-8f8f-ef139122006aDepartment of Computer Science2004Creese, SGoldsmith, MRoscoe, AZakiuddin, IRobinson, PVogt, HWagealla, W |
spellingShingle | Creese, S Goldsmith, M Roscoe, A Zakiuddin, I Security properties and mechanisms in human−centric computing |
title | Security properties and mechanisms in human−centric computing |
title_full | Security properties and mechanisms in human−centric computing |
title_fullStr | Security properties and mechanisms in human−centric computing |
title_full_unstemmed | Security properties and mechanisms in human−centric computing |
title_short | Security properties and mechanisms in human−centric computing |
title_sort | security properties and mechanisms in human centric computing |
work_keys_str_mv | AT creeses securitypropertiesandmechanismsinhumancentriccomputing AT goldsmithm securitypropertiesandmechanismsinhumancentriccomputing AT roscoea securitypropertiesandmechanismsinhumancentriccomputing AT zakiuddini securitypropertiesandmechanismsinhumancentriccomputing |