Advertisement

Why I’m Not an Entropist

(Transcript of Discussion)
  • Paul Syverson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7028)

Abstract

The previous talk was about trying to get entropy, and I’m going to talk about ignoring entropy. It’s natural to talk about anonymity in a workshop about brief encounters and security protocols, I would say anonymity is the quintessence of brief encounter, you only have a brief encounter if in fact you are anonymous, so you need to be anonymous to guarantee that it is brief, otherwise it is at best pseudonymous, because you’re preserving state from one instance of communication to another.

Keywords

Security Protocol Adversary Model Correlation Attack Anonymity System Previous Talk 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Paul Syverson
    • 1
  1. 1.Naval Research LaboratoryUSA

Personalised recommendations