Next:
Bibliography
Up:
Security Analysis of the
Previous:
Conclusions
Acknowledgments
The authors would like to thank @stake's Research Labs, especially Brian Carrier, for constructive criticism and interesting discussions.
Kingpin
2001-05-09