Vis enkel innførsel

dc.contributor.authorMjølsnes, Stig Frode
dc.date.accessioned2015-11-10T11:13:53Z
dc.date.accessioned2016-07-07T11:43:57Z
dc.date.available2015-11-10T11:13:53Z
dc.date.available2016-07-07T11:43:57Z
dc.date.issued2015
dc.identifier.citationMjølsnes, Stig Frode [Eds.] Technology and Practice of Passwords p. V-X Lecture Notes in Computer Science, Springer Publishing Company, 2015nb_NO
dc.identifier.isbn978-3-319-24192-0
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2395976
dc.description.abstractHackers, in the wide positive sense, are often enthusiastic presenters of their practical experience and exploits, but quite indifferent to writing papers. By contrast, scientists are good at writing papers, but often oblivious to the actual details of practice. At times, this difference in approach incites antagonistic attitudes between these communities. We wanted to mingle the two, shall we say, the explorers and the explanators, for mutual inspiration and communication to the benefit of the conference topic. Certainly a risky ambition, but we wanted to give it a try. And judging by the response from the participants, we succeeded!nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer International Publishingnb_NO
dc.relation.ispartofseriesLecture Notes in Computer Science;
dc.relation.urihttp://link.springer.com/book/10.1007%2F978-3-319-24192-0
dc.titlePrefacenb_NO
dc.typeChapternb_NO
dc.date.updated2015-11-10T11:13:53Z
dc.description.versionacceptedVersion
dc.source.volume9393nb_NO
dc.identifier.doi10.1007/978-3-319-24192-0
dc.identifier.cristin1287736
dc.description.localcodeThe final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-24192-0nb_NO


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel