Why Are We Authenticating (Transcript of Discussion)

  • Mark Lomas
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3957)


I think it’s important to understand the purpose behind verification before you actually try and design an authentication protocol, because if you don’t know what you’re trying to achieve there’s not really much point.


User Interface Authentication Protocol Excel Spreadsheet Authentication Mechanism Access Permission 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Mark Lomas
    • 1
  1. 1.Arabella (Arab Bank Group)UK

Personalised recommendations