Show simple item record

dc.contributor.authorChristianson, B.
dc.date.accessioned2012-02-14T15:00:53Z
dc.date.available2012-02-14T15:00:53Z
dc.date.issued2005
dc.identifier.citationChristianson , B 2005 , ' Where have all the protocols gone? ' , Lecture Notes in Computer Science (LNCS) , vol. 3364 , pp. 1-2 . https://doi.org/10.1007/11542322_1
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/2299/7805
dc.description.abstractThere was a time when security protocols lived mainly in the network and transport layers. Where are they now? Some have moved downstairs, towards the physical layer. What used to be a wide-area authentication or session establishment protocol is now a very local interaction with a trusted device, such as a tamper-evident smartcard, or a biometric token. Indeed, in some cases a piece of mobile hardware has actually replaced altogether the security protocol that we used to find. Now in the strict sense, there is still a security protocol here: we use a set of rules to construct an artefact which will then be moved into a different context and interpreted in accordance with a shared set of conventions. But the individual protocol run no longer involves the same kind of electronic message-passing that we used to see or rather, as Marshall McLuhan would have said, the medium is now the message.en
dc.format.extent2
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS)
dc.titleWhere have all the protocols gone?en
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.description.statusPeer reviewed
rioxxterms.versionofrecord10.1007/11542322_1
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record