next up previous
Next: 4.2.1 Introduction Up: 4 Appendix 4: More Previous: 4.1.3 Other Factors

4.2 Security Assessment of the SHTTP Protocol



 

Denis Arnaud
12/19/1997