Abstract
This is some work I did last year with Bill Roscoe. I was on sabbatical so it’s a kind of “What I did on my sabbatical” talk. I guess it fits with what seems to be an emerging theme in these sessions of the detection of attacks. I should perhaps explain that the use of term emphauditable was I think coined by Bill, to indicate the design of a protocols in such a way that legitimate parties can detect when they’re under attack. That I hope will become clear in a moment.
Cite
CITATION STYLE
Ryan, P. Y. A. (2017). Auditable PAKEs: Approaching fair exchange without a TTP (Transcript of discussion). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10476 LNCS, pp. 298–305). Springer Verlag. https://doi.org/10.1007/978-3-319-71075-4_32
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.