dc.contributor.author | Foley, Simon N. | |
dc.contributor.author | Rooney, Vivien | |
dc.date.accessioned | 2021-02-24T09:32:20Z | |
dc.date.available | 2021-02-24T09:32:20Z | |
dc.date.created | 2020-10-28T14:19:32Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Lecture Notes in Computer Science (LNCS). 2020, 12287 82-88. | en_US |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | https://hdl.handle.net/11250/2729990 | |
dc.description.abstract | This is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Vivien’s an applied psychologist. We’re interested in understanding how humans experience working with security protocols. And, when I use the word “security protocol”, I mean it in the most general sense: a set of rules that people and machines are supposed to follow. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Springer Verlag | en_US |
dc.title | Social Constructionism in Security Protocols (Transcript of Discussion) | en_US |
dc.type | Peer reviewed | en_US |
dc.type | Journal article | en_US |
dc.description.version | acceptedVersion | en_US |
dc.source.pagenumber | 82-88 | en_US |
dc.source.volume | 12287 | en_US |
dc.source.journal | Lecture Notes in Computer Science (LNCS) | en_US |
dc.identifier.doi | https://doi.org/10.1007/978-3-030-57043-9_8 | |
dc.identifier.cristin | 1842979 | |
dc.description.localcode | This is a post-peer-review, pre-copyedit version of an article. The final authenticated version is available online at: http://dx.doi.org/https://doi.org/10.1007/978-3-030-57043-9_8 | en_US |
cristin.ispublished | true | |
cristin.fulltext | postprint | |
cristin.qualitycode | 1 | |