Introduction: Alice doesn't live here anymore (transcript)

    Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution


    Hello everyone and welcome to the 19th Security Protocols Workshop. The theme this year, which it is traditional to mention in the first session (and then never refer to again), is "Alice doesn't live here anymore". One of the perennial problems in analysing security protocols is how we distinguish Alice from not-Alice. The prevailing wisdom is that Alice possesses something which not-Alice does not. It might be knowledge of something that is used as a key. It might be that Alice possesses some physical characteristic, such as a biometric, or that there is something about the hardware that Alice is running on that is difficult to replicate. Or it might be that Alice possesses exclusive access to the interface to some distinguishing piece of hardware, like a dongle, although such hardware (when we think about it) usually belongs to some other security domain anyway.
    Original languageEnglish
    Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Number of pages3
    Publication statusPublished - 1 Jan 2011
    Event19th International Security Protocols Workshop - Cambridge, United Kingdom
    Duration: 28 Mar 201130 Mar 2011


    Conference19th International Security Protocols Workshop
    Country/TerritoryUnited Kingdom


    Dive into the research topics of 'Introduction: Alice doesn't live here anymore (transcript)'. Together they form a unique fingerprint.

    Cite this