University of Hertfordshire

By the same authors

Introduction: Alice doesn't live here anymore (transcript)

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

View graph of relations
Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Number of pages3
Publication statusPublished - 1 Jan 2011
Event19th International Security Protocols Workshop - Cambridge, United Kingdom
Duration: 28 Mar 201130 Mar 2011


Conference19th International Security Protocols Workshop
CountryUnited Kingdom


Hello everyone and welcome to the 19th Security Protocols Workshop. The theme this year, which it is traditional to mention in the first session (and then never refer to again), is "Alice doesn't live here anymore". One of the perennial problems in analysing security protocols is how we distinguish Alice from not-Alice. The prevailing wisdom is that Alice possesses something which not-Alice does not. It might be knowledge of something that is used as a key. It might be that Alice possesses some physical characteristic, such as a biometric, or that there is something about the hardware that Alice is running on that is difficult to replicate. Or it might be that Alice possesses exclusive access to the interface to some distinguishing piece of hardware, like a dongle, although such hardware (when we think about it) usually belongs to some other security domain anyway.

ID: 668578