Abstract | ||
---|---|---|
Tuomas Aura: You criticised the fact that tools have built in assumptions, but this depends on the tool user. If you think of things such
as program-defining tools, or program checkers, something that you want someone to use over and over again, they should do
things automatically, and get it right most of the time. In that case you don’t want the user to start to model the assumptions,
or the security protocols, but you instead want these to be built in, in all possible combinations.
|
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-642-22137-8_6 | Security Protocols Workshop |
Field | DocType | Volume |
Internet privacy,Cryptographic protocol,Computer security,Computer science | Conference | 6615 |
ISSN | Citations | PageRank |
0302-9743 | 0 | 0.34 |
References | Authors | |
1 | 1 |