<--- Back to Details
First PageDocument Content
Date: 2004-07-14 23:06:27

Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer. SECURITY

Add to Reading List

Source URL: www.cs.jhu.edu

Download Document from Source Website

File Size: 96,54 KB

Share Document on Facebook

Similar Documents