dc.contributor.author | Christianson, B. | |
dc.date.accessioned | 2012-02-14T15:00:53Z | |
dc.date.available | 2012-02-14T15:00:53Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Christianson , B 2005 , ' Where have all the protocols gone? ' , Lecture Notes in Computer Science (LNCS) , vol. 3364 , pp. 1-2 . https://doi.org/10.1007/11542322_1 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.uri | http://hdl.handle.net/2299/7805 | |
dc.description.abstract | There was a time when security protocols lived mainly in the network and transport layers. Where are they now? Some have moved downstairs, towards the physical layer. What used to be a wide-area authentication or session establishment protocol is now a very local interaction with a trusted device, such as a tamper-evident smartcard, or a biometric token. Indeed, in some cases a piece of mobile hardware has actually replaced altogether the security protocol that we used to find. Now in the strict sense, there is still a security protocol here: we use a set of rules to construct an artefact which will then be moved into a different context and interpreted in accordance with a shared set of conventions. But the individual protocol run no longer involves the same kind of electronic message-passing that we used to see or rather, as Marshall McLuhan would have said, the medium is now the message. | en |
dc.format.extent | 2 | |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (LNCS) | |
dc.title | Where have all the protocols gone? | en |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1007/11542322_1 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |