Security Protocol Deployment Risk. Foley, S. N., Bella, G., & Bistarelli, S. In Christianson, B., Malcolm, J. A., Matyas, V., & Roe, M., editors, Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers, volume 6615, of Lecture Notes in Computer Science, pages 12–20, 2008. Springer. Paper doi bibtex @inproceedings{DBLP:conf/spw/FoleyBB08,
author = {Simon N. Foley and
Giampaolo Bella and
Stefano Bistarelli},
editor = {Bruce Christianson and
James A. Malcolm and
Vashek Matyas and
Michael Roe},
title = {Security Protocol Deployment Risk},
booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge,
UK, April 16-18, 2008. Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {6615},
pages = {12--20},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-642-22137-8\_3},
doi = {10.1007/978-3-642-22137-8\_3},
timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/spw/FoleyBB08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":{"_str":"53f475e53d9d602c1a00128a"},"__v":1,"authorIDs":["5457089d8b01c8193000012f"],"author_short":["Foley, S. N.","Bella, G.","Bistarelli, S."],"bibbaseid":"foley-bella-bistarelli-securityprotocoldeploymentrisk-2008","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Simon","N."],"propositions":[],"lastnames":["Foley"],"suffixes":[]},{"firstnames":["Giampaolo"],"propositions":[],"lastnames":["Bella"],"suffixes":[]},{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]}],"editor":[{"firstnames":["Bruce"],"propositions":[],"lastnames":["Christianson"],"suffixes":[]},{"firstnames":["James","A."],"propositions":[],"lastnames":["Malcolm"],"suffixes":[]},{"firstnames":["Vashek"],"propositions":[],"lastnames":["Matyas"],"suffixes":[]},{"firstnames":["Michael"],"propositions":[],"lastnames":["Roe"],"suffixes":[]}],"title":"Security Protocol Deployment Risk","booktitle":"Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers","series":"Lecture Notes in Computer Science","volume":"6615","pages":"12–20","publisher":"Springer","year":"2008","url":"https://doi.org/10.1007/978-3-642-22137-8\\_3","doi":"10.1007/978-3-642-22137-8_3","timestamp":"Sat, 19 Oct 2019 01:00:00 +0200","biburl":"https://dblp.org/rec/conf/spw/FoleyBB08.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/spw/FoleyBB08,\n author = {Simon N. Foley and\n Giampaolo Bella and\n Stefano Bistarelli},\n editor = {Bruce Christianson and\n James A. Malcolm and\n Vashek Matyas and\n Michael Roe},\n title = {Security Protocol Deployment Risk},\n booktitle = {Security Protocols {XVI} - 16th International Workshop, Cambridge,\n UK, April 16-18, 2008. Revised Selected Papers},\n series = {Lecture Notes in Computer Science},\n volume = {6615},\n pages = {12--20},\n publisher = {Springer},\n year = {2008},\n url = {https://doi.org/10.1007/978-3-642-22137-8\\_3},\n doi = {10.1007/978-3-642-22137-8\\_3},\n timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/spw/FoleyBB08.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Foley, S. N.","Bella, G.","Bistarelli, S."],"editor_short":["Christianson, B.","Malcolm, J. A.","Matyas, V.","Roe, M."],"key":"DBLP:conf/spw/FoleyBB08","id":"DBLP:conf/spw/FoleyBB08","bibbaseid":"foley-bella-bistarelli-securityprotocoldeploymentrisk-2008","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-642-22137-8\\_3"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/6380.bib","creationDate":"2014-08-20T10:18:13.683Z","downloads":0,"keywords":[],"search_terms":["security","protocol","deployment","risk","foley","bella","bistarelli"],"title":"Security Protocol Deployment Risk","year":2008,"dataSources":["BdSNx7DFqX9RjWbWF","T6HLi2LBH4teAezac","LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"]}