Team for Research in
Ubiquitous Secure Technology

ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook
Stephen Wicker

Citation
Stephen Wicker. "ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook". Talk or presentation, 3, November, 2011; Presented at the TRUST Autumn 2011 Conference.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Stephen Wicker. <a
    href="http://www.truststc.org/pubs/804.html"><i>ENGRI
    1280: Security, Privacy, and Information Network Design:
    Wiretaps to Facebook</i></a>, Talk or
    presentation,  3, November, 2011; Presented at the <a
    href="http://www.truststc.org/conferences/11/FallConference"
    >TRUST Autumn 2011 Conference</a>.
  • Plain text
    Stephen Wicker. "ENGRI 1280: Security, Privacy, and
    Information Network Design: Wiretaps to Facebook". Talk
    or presentation,  3, November, 2011; Presented at the <a
    href="http://www.truststc.org/conferences/11/FallConference"
    >TRUST Autumn 2011 Conference</a>.
  • BibTeX
    @presentation{Wicker11_ENGRI1280SecurityPrivacyInformationNetworkDesign,
        author = {Stephen Wicker},
        title = {ENGRI 1280: Security, Privacy, and Information
                  Network Design: Wiretaps to Facebook},
        day = {3},
        month = {November},
        year = {2011},
        note = {Presented at the <a
                  href="http://www.truststc.org/conferences/11/FallConference"
                  >TRUST Autumn 2011 Conference</a>},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/804.html}
    }
    

Posted by Christopher Brooks on 3 Nov 2011.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.