Back to Results
First PageMeta Content



Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer. SECURITY
Add to Reading List

Document Date: 2004-07-14 23:06:27


Open Document

File Size: 96,54 KB

Share Result on Facebook