Show simple item record

dc.contributor.authorFoley, Simon N.
dc.contributor.authorRooney, Vivien
dc.date.accessioned2021-02-24T09:32:20Z
dc.date.available2021-02-24T09:32:20Z
dc.date.created2020-10-28T14:19:32Z
dc.date.issued2020
dc.identifier.citationLecture Notes in Computer Science (LNCS). 2020, 12287 82-88.en_US
dc.identifier.issn0302-9743
dc.identifier.urihttps://hdl.handle.net/11250/2729990
dc.description.abstractThis is joint work between myself and my co-author, Vivien Rooney. I’m a computer scientist, and Vivien’s an applied psychologist. We’re interested in understanding how humans experience working with security protocols. And, when I use the word “security protocol”, I mean it in the most general sense: a set of rules that people and machines are supposed to follow.en_US
dc.language.isoengen_US
dc.publisherSpringer Verlagen_US
dc.titleSocial Constructionism in Security Protocols (Transcript of Discussion)en_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.source.pagenumber82-88en_US
dc.source.volume12287en_US
dc.source.journalLecture Notes in Computer Science (LNCS)en_US
dc.identifier.doihttps://doi.org/10.1007/978-3-030-57043-9_8
dc.identifier.cristin1842979
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article. The final authenticated version is available online at: http://dx.doi.org/https://doi.org/10.1007/978-3-030-57043-9_8en_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record