Abstract
The main idea behind this talk is an idea of Giampaolo Bella from the University of Catania. The general picture nowadays is that each transfer has just one precise short-lived goal, such as for an eBay purchase, and each transfer may attempt malice aiming for personal benefit to them of money, or any kind of purchases. In the context of brief encounters, each transfer can just quickly leave one context and join another. If each may choose transfers, they can really collude towards the same malicious goal, and if they want to share the greater knowledge. But it’s more realistic, that each malicious transfer will act for his own sake, and just use the resources at his disposal, and try to attack on his own.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chantry, X. (2013). Attacking Each Other. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-36213-2_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36212-5
Online ISBN: 978-3-642-36213-2
eBook Packages: Computer ScienceComputer Science (R0)