The attacker in ubiquitous computing environments: formalising the threat model
Autores principales: | , , , |
---|---|
Formato: | Conference item |
Publicado: |
2003
|
_version_ | 1826302587703394304 |
---|---|
author | Roscoe, A Creese, S Goldsmith, M I.Zakiuddin |
author_facet | Roscoe, A Creese, S Goldsmith, M I.Zakiuddin |
author_sort | Roscoe, A |
collection | OXFORD |
description | |
first_indexed | 2024-03-07T05:49:51Z |
format | Conference item |
id | oxford-uuid:e87e1707-b403-4ae4-aac9-8415bc1e868f |
institution | University of Oxford |
last_indexed | 2024-03-07T05:49:51Z |
publishDate | 2003 |
record_format | dspace |
spelling | oxford-uuid:e87e1707-b403-4ae4-aac9-8415bc1e868f2022-03-27T10:47:09ZThe attacker in ubiquitous computing environments: formalising the threat modelConference itemhttp://purl.org/coar/resource_type/c_5794uuid:e87e1707-b403-4ae4-aac9-8415bc1e868fDepartment of Computer Science2003Roscoe, ACreese, SGoldsmith, MI.Zakiuddin |
spellingShingle | Roscoe, A Creese, S Goldsmith, M I.Zakiuddin The attacker in ubiquitous computing environments: formalising the threat model |
title | The attacker in ubiquitous computing environments: formalising the threat model |
title_full | The attacker in ubiquitous computing environments: formalising the threat model |
title_fullStr | The attacker in ubiquitous computing environments: formalising the threat model |
title_full_unstemmed | The attacker in ubiquitous computing environments: formalising the threat model |
title_short | The attacker in ubiquitous computing environments: formalising the threat model |
title_sort | attacker in ubiquitous computing environments formalising the threat model |
work_keys_str_mv | AT roscoea theattackerinubiquitouscomputingenvironmentsformalisingthethreatmodel AT creeses theattackerinubiquitouscomputingenvironmentsformalisingthethreatmodel AT goldsmithm theattackerinubiquitouscomputingenvironmentsformalisingthethreatmodel AT izakiuddin theattackerinubiquitouscomputingenvironmentsformalisingthethreatmodel AT roscoea attackerinubiquitouscomputingenvironmentsformalisingthethreatmodel AT creeses attackerinubiquitouscomputingenvironmentsformalisingthethreatmodel AT goldsmithm attackerinubiquitouscomputingenvironmentsformalisingthethreatmodel AT izakiuddin attackerinubiquitouscomputingenvironmentsformalisingthethreatmodel |