Exploiting Empirical Engagement in Authentication Protocol Design

Bibliographic Details
Main Authors: Creese, S, Goldsmith, M, Harrison, R, Roscoe, B, Whittaker, P, Zakiuddin, I
Format: Conference item
Published: 2005
_version_ 1797084835490037760
author Creese, S
Goldsmith, M
Harrison, R
Roscoe, B
Whittaker, P
Zakiuddin, I
author_facet Creese, S
Goldsmith, M
Harrison, R
Roscoe, B
Whittaker, P
Zakiuddin, I
author_sort Creese, S
collection OXFORD
description
first_indexed 2024-03-07T02:00:39Z
format Conference item
id oxford-uuid:9d414f05-a36f-4f2f-97c1-dcf4e78946ee
institution University of Oxford
last_indexed 2024-03-07T02:00:39Z
publishDate 2005
record_format dspace
spelling oxford-uuid:9d414f05-a36f-4f2f-97c1-dcf4e78946ee2022-03-27T00:41:37ZExploiting Empirical Engagement in Authentication Protocol DesignConference itemhttp://purl.org/coar/resource_type/c_5794uuid:9d414f05-a36f-4f2f-97c1-dcf4e78946eeDepartment of Computer Science2005Creese, SGoldsmith, MHarrison, RRoscoe, BWhittaker, PZakiuddin, I
spellingShingle Creese, S
Goldsmith, M
Harrison, R
Roscoe, B
Whittaker, P
Zakiuddin, I
Exploiting Empirical Engagement in Authentication Protocol Design
title Exploiting Empirical Engagement in Authentication Protocol Design
title_full Exploiting Empirical Engagement in Authentication Protocol Design
title_fullStr Exploiting Empirical Engagement in Authentication Protocol Design
title_full_unstemmed Exploiting Empirical Engagement in Authentication Protocol Design
title_short Exploiting Empirical Engagement in Authentication Protocol Design
title_sort exploiting empirical engagement in authentication protocol design
work_keys_str_mv AT creeses exploitingempiricalengagementinauthenticationprotocoldesign
AT goldsmithm exploitingempiricalengagementinauthenticationprotocoldesign
AT harrisonr exploitingempiricalengagementinauthenticationprotocoldesign
AT roscoeb exploitingempiricalengagementinauthenticationprotocoldesign
AT whittakerp exploitingempiricalengagementinauthenticationprotocoldesign
AT zakiuddini exploitingempiricalengagementinauthenticationprotocoldesign