Exploiting Empirical Engagement in Authentication Protocol Design
Main Authors: | , , , , , |
---|---|
Format: | Conference item |
Published: |
2005
|
_version_ | 1797084835490037760 |
---|---|
author | Creese, S Goldsmith, M Harrison, R Roscoe, B Whittaker, P Zakiuddin, I |
author_facet | Creese, S Goldsmith, M Harrison, R Roscoe, B Whittaker, P Zakiuddin, I |
author_sort | Creese, S |
collection | OXFORD |
description | |
first_indexed | 2024-03-07T02:00:39Z |
format | Conference item |
id | oxford-uuid:9d414f05-a36f-4f2f-97c1-dcf4e78946ee |
institution | University of Oxford |
last_indexed | 2024-03-07T02:00:39Z |
publishDate | 2005 |
record_format | dspace |
spelling | oxford-uuid:9d414f05-a36f-4f2f-97c1-dcf4e78946ee2022-03-27T00:41:37ZExploiting Empirical Engagement in Authentication Protocol DesignConference itemhttp://purl.org/coar/resource_type/c_5794uuid:9d414f05-a36f-4f2f-97c1-dcf4e78946eeDepartment of Computer Science2005Creese, SGoldsmith, MHarrison, RRoscoe, BWhittaker, PZakiuddin, I |
spellingShingle | Creese, S Goldsmith, M Harrison, R Roscoe, B Whittaker, P Zakiuddin, I Exploiting Empirical Engagement in Authentication Protocol Design |
title | Exploiting Empirical Engagement in Authentication Protocol Design |
title_full | Exploiting Empirical Engagement in Authentication Protocol Design |
title_fullStr | Exploiting Empirical Engagement in Authentication Protocol Design |
title_full_unstemmed | Exploiting Empirical Engagement in Authentication Protocol Design |
title_short | Exploiting Empirical Engagement in Authentication Protocol Design |
title_sort | exploiting empirical engagement in authentication protocol design |
work_keys_str_mv | AT creeses exploitingempiricalengagementinauthenticationprotocoldesign AT goldsmithm exploitingempiricalengagementinauthenticationprotocoldesign AT harrisonr exploitingempiricalengagementinauthenticationprotocoldesign AT roscoeb exploitingempiricalengagementinauthenticationprotocoldesign AT whittakerp exploitingempiricalengagementinauthenticationprotocoldesign AT zakiuddini exploitingempiricalengagementinauthenticationprotocoldesign |