Introduction: Authentic Privacy
Well hello, and welcome to the twelfth Security Protocols Workshop. When this all started we had no idea what a juggernaut we were creating, and it’s particularly nice to see so many young people here. [Laughter]
KeywordsPersonal Attack Graceful Degradation Privacy Loss Absolute Good Strong Authentication
Unable to display preview. Download preview PDF.