The attacker in ubiquitous computing environments: formalising the threat model

Detalles Bibliográficos
Autores principales: Roscoe, A, Creese, S, Goldsmith, M, I.Zakiuddin
Formato: Conference item
Publicado: 2003
_version_ 1826302587703394304
author Roscoe, A
Creese, S
Goldsmith, M
I.Zakiuddin
author_facet Roscoe, A
Creese, S
Goldsmith, M
I.Zakiuddin
author_sort Roscoe, A
collection OXFORD
description
first_indexed 2024-03-07T05:49:51Z
format Conference item
id oxford-uuid:e87e1707-b403-4ae4-aac9-8415bc1e868f
institution University of Oxford
last_indexed 2024-03-07T05:49:51Z
publishDate 2003
record_format dspace
spelling oxford-uuid:e87e1707-b403-4ae4-aac9-8415bc1e868f2022-03-27T10:47:09ZThe attacker in ubiquitous computing environments: formalising the threat modelConference itemhttp://purl.org/coar/resource_type/c_5794uuid:e87e1707-b403-4ae4-aac9-8415bc1e868fDepartment of Computer Science2003Roscoe, ACreese, SGoldsmith, MI.Zakiuddin
spellingShingle Roscoe, A
Creese, S
Goldsmith, M
I.Zakiuddin
The attacker in ubiquitous computing environments: formalising the threat model
title The attacker in ubiquitous computing environments: formalising the threat model
title_full The attacker in ubiquitous computing environments: formalising the threat model
title_fullStr The attacker in ubiquitous computing environments: formalising the threat model
title_full_unstemmed The attacker in ubiquitous computing environments: formalising the threat model
title_short The attacker in ubiquitous computing environments: formalising the threat model
title_sort attacker in ubiquitous computing environments formalising the threat model
work_keys_str_mv AT roscoea theattackerinubiquitouscomputingenvironmentsformalisingthethreatmodel
AT creeses theattackerinubiquitouscomputingenvironmentsformalisingthethreatmodel
AT goldsmithm theattackerinubiquitouscomputingenvironmentsformalisingthethreatmodel
AT izakiuddin theattackerinubiquitouscomputingenvironmentsformalisingthethreatmodel
AT roscoea attackerinubiquitouscomputingenvironmentsformalisingthethreatmodel
AT creeses attackerinubiquitouscomputingenvironmentsformalisingthethreatmodel
AT goldsmithm attackerinubiquitouscomputingenvironmentsformalisingthethreatmodel
AT izakiuddin attackerinubiquitouscomputingenvironmentsformalisingthethreatmodel