Introduction: Alice doesn't live here anymore (transcript)

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Hello everyone and welcome to the 19th Security Protocols Workshop. The theme this year, which it is traditional to mention in the first session (and then never refer to again), is "Alice doesn't live here anymore". One of the perennial problems in analysing security protocols is how we distinguish Alice from not-Alice. The prevailing wisdom is that Alice possesses something which not-Alice does not. It might be knowledge of something that is used as a key. It might be that Alice possesses some physical characteristic, such as a biometric, or that there is something about the hardware that Alice is running on that is difficult to replicate. Or it might be that Alice possesses exclusive access to the interface to some distinguishing piece of hardware, like a dongle, although such hardware (when we think about it) usually belongs to some other security domain anyway. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Christianson, B. (2011). Introduction: Alice doesn’t live here anymore (transcript). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7114 LNCS, pp. 1–3). https://doi.org/10.1007/978-3-642-25867-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free