Abstract
Each year we have a theme, and each year people give talks about either the previous year’s theme or next year’s theme. This year the theme is discerning the protocol participants. There are usually several people who have an interest in a particular run of a protocol besides those who are actually sending and receiving the messages. When we come to do the proceedings we’ll try and pretend that everything that was said has something to do with this. Today we’re looking mainly at authentication. There are some people who are going to try to convince us that authentication is harmful, there are some who are going to talk about why authentication is a good thing that doesn’t actually involve knowing who people are in real life, there are some people who are going to argue that authentication doesn’t involve trusted third parties and that trusted third parties are actually bad for you, there are other people who will talk about why trusted third parties are jolly good things to have provided you don’t use them for any of the things that they’re usually sold to you for.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Christianson, B. (2004). Introduction (Transcript). In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2002. Lecture Notes in Computer Science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-39871-4_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20830-3
Online ISBN: 978-3-540-39871-4
eBook Packages: Springer Book Archive