Abstract | ||
---|---|---|
I’d like to shift views a little bit, and think about the problem that we usually focus on, which is building good defences,
from the point of view of how to attack effectively. We tend to focus on the defending problem, for example, the confidentiality
of my traffic, and in the mainstream and conservative approach to security that we all know and love we make very generous
assumptions about the adversary: we are willing to assume that the adversary gets a copy of every packet we send, it can alter
some of the bits in real time, and has unlimited computational power, etc. As a result of that conservative assumption, we
ask to have solutions that assume that the network is unlimitedly hostile. And, if you want security, we must accept nothing
less than end-to-end security, and if we don’t have to end-to-end security we simply assume that it is insecure, because it
would be very silly to depend on anything less than this very reasonable conservative assumption.
|
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/978-3-540-77156-2_31 | Security Protocols Workshop |
Field | DocType | Citations |
World Wide Web,Media studies,Computer science | Conference | 2 |
PageRank | References | Authors |
0.39 | 0 | 9 |
Name | Order | Citations | PageRank |
---|---|---|---|
matt blaze | 1 | 3189 | 381.70 |
ross anderson | 2 | 2 | 0.39 |
raymond b clayton | 3 | 2 | 0.39 |
frank stajano | 4 | 2 | 0.39 |
Tuomas Aura | 5 | 552 | 77.28 |
George Danezis | 6 | 3130 | 226.61 |
Yvo G. Desmedt | 7 | 1973 | 281.64 |
Alf Zugenmaier | 8 | 208 | 26.01 |
bruce christianson | 9 | 61 | 13.65 |