Skip to main content

Afterward

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2133))

Included in the following conference series:

  • 323 Accesses

Abstract

Larry Paulson: I’ve always wanted to know why these RFCs are created as plain ASCII text files with figures drawn in ASCII art as if this were 1975.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

(2001). Afterward. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds) Security Protocols. Security Protocols 2000. Lecture Notes in Computer Science, vol 2133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44810-1_34

Download citation

  • DOI: https://doi.org/10.1007/3-540-44810-1_34

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42566-3

  • Online ISBN: 978-3-540-44810-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics