Abstract
This paper contains the presentation and discussion associated with Jaggard and Wright’s paper in this volume “Strange Bedfellows: How and When to Work with Your Enemy”.
Work partially carried out with support from the National Science Foundation under grants CNS-1018557 and CCF-1101690.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Wright, R.N. (2014). Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion). In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-12400-1_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12399-8
Online ISBN: 978-3-319-12400-1
eBook Packages: Computer ScienceComputer Science (R0)