2014
DOI: 10.1007/978-3-662-44893-9_8
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Data Flow in the Newscast Protocol for Possible Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…These problems have been analyzed in [33] but in principle our working hypothesis will be that the clients using the browser are not manipulating the code make the experiment finish before it should, which is possibly the only way in which the experiment would be affected.…”
Section: Introductionmentioning
confidence: 99%
“…These problems have been analyzed in [33] but in principle our working hypothesis will be that the clients using the browser are not manipulating the code make the experiment finish before it should, which is possibly the only way in which the experiment would be affected.…”
Section: Introductionmentioning
confidence: 99%