Abstract
I’ll start as I often do with an obligatory handwave towards the theme of the workshop. This isn’t so much about bringing protocols to life as a protocol that says whether or not you are currently alive, and this is based on some thinking I’ve been doing with Robert Watson. The title is “Stayin’ Alive: Aliveness as an alternative to authentication”, because sometimes authentication is not the property that you actually want.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, J. (2012). Stayin’ Alive: Aliveness as an Alternative to Authentication (Transcript of Discussion). In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-35694-0_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35693-3
Online ISBN: 978-3-642-35694-0
eBook Packages: Computer ScienceComputer Science (R0)