The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
Does deterrence work in reducing information security policy abuse by employees?
Communications of the ACM
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
Towards a theory of trust in networks of humans and computers
SP'11 Proceedings of the 19th international conference on Security Protocols
Hi-index | 0.00 |
In keeping up with the idea of bringing security protocols to life, I'm going to talk about the act of trusting in interactive send-receive protocols. This class of protocols is similar to the "trust game" I presented last year, except that it does not require the existence of a dealer. Specifically, I am going to ask the question of whether it is ever safe to trust input received from an unknown sender.