On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike)


Discussion p. 60 PIN (and Chip) or Signature: Beating the Cheating? p. 69 Discussion p. 76 Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable) p. 82 Discussion p. 89 Authorisation Subterfuge by Delegation in Decentralised Networks p. 97 Discussion p. 103 Multi-channel Protocols p. 112 Discussion p. 128 Combining Crypto with… (More)
DOI: 10.1007/978-3-540-77156-2_34


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.