Introduction: Authentic Privacy

  • Bruce Christianson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3957)


Well hello, and welcome to the twelfth Security Protocols Workshop. When this all started we had no idea what a juggernaut we were creating, and it’s particularly nice to see so many young people here. [Laughter]


Personal Attack Graceful Degradation Privacy Loss Absolute Good Strong Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Bruce Christianson
    • 1
  1. 1.University of HertfordshireUK

Personalised recommendations