Abstract
Hello everyone and welcome to the 19th Security Protocols Workshop. The theme this year, which it is traditional to mention in the first session (and then never refer to again), is "Alice doesn't live here anymore". One of the perennial problems in analysing security protocols is how we distinguish Alice from not-Alice. The prevailing wisdom is that Alice possesses something which not-Alice does not. It might be knowledge of something that is used as a key. It might be that Alice possesses some physical characteristic, such as a biometric, or that there is something about the hardware that Alice is running on that is difficult to replicate. Or it might be that Alice possesses exclusive access to the interface to some distinguishing piece of hardware, like a dongle, although such hardware (when we think about it) usually belongs to some other security domain anyway.
Original language | English |
---|---|
Title of host publication | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Pages | 1-3 |
Number of pages | 3 |
Volume | 7114 |
DOIs | |
Publication status | Published - 1 Jan 2011 |
Event | 19th International Security Protocols Workshop - Cambridge, United Kingdom Duration: 28 Mar 2011 → 30 Mar 2011 |
Conference
Conference | 19th International Security Protocols Workshop |
---|---|
Country/Territory | United Kingdom |
City | Cambridge |
Period | 28/03/11 → 30/03/11 |