Skip to main content

Paul Revere Protocols (Transcript of Discussion)

  • Conference paper
  • 963 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7622))

Abstract

All right, saving the worst for last. I guess, keeping with the theme, this is not (well in a sense it is) about bringing protocols to life: in this case it’s more bringing history to life. I’m going to be describing an actual protocol that was quite significant in history. Some people may know about it. This is a poem that describes the events. This is something that American schoolchildren for many generations, or decades, were forced to memorize after it came out. I was actually, I think, after that period: I don’t remember ever having to memorize this (and my school did keep things around for a long time: we were still having air-raid drills when I was a senior in high school in 1976). But in any case I didn’t have to memorize this.

The rights of this work are transferred to the extent transferable according to title 17 U.S.C. 105.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Syverson, P. (2012). Paul Revere Protocols (Transcript of Discussion). In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35694-0_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35693-3

  • Online ISBN: 978-3-642-35694-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics