First Page | Document Content | |
---|---|---|
Date: 2004-07-14 23:06:27 | Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer. SECURITYAdd to Reading ListSource URL: www.cs.jhu.eduDownload Document from Source WebsiteFile Size: 96,54 KBShare Document on Facebook |