Search for persons
X
?
Security Protocols XXVII; Lecture Notes in Computer Science ,
6
Mismorphism: The Heart of the Weird Machine:
, In:
?
Security Protocols XXVII; Lecture Notes in Computer Science ,
7
Human-Computability Boundaries (Transcript of Discussion):
, In:
?
Security Protocols XXVII; Lecture Notes in Computer Science ,
8
Human-Computability Boundaries:
, In:
?
Proceedings of the New Security Paradigms Workshop ,
9