Strange bedfellows: How and when to work with your enemy

Aaron D. Jaggard, Rebecca N. Wright

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

There are many examples of parties that are seemingly in opposition working together. In this position paper, we explore this in the context of security protocols with an emphasis on how these examples might produce long-term benefits for the “good guys” and how a formal model might be used to help prescribe approaches to collaboration with the “bad guys.”.

Original languageEnglish (US)
Title of host publicationSecurity Protocols XXII - 22nd International Workshop, Revised Selected Papers
EditorsFrank Stajano, Vashek Matyáš, Petr Švenda, Jonathan Anderson, Bruce Christianson, James Malcolm
PublisherSpringer Verlag
Pages263-267
Number of pages5
ISBN (Electronic)9783319123998
DOIs
StatePublished - 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8809
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Strange bedfellows: How and when to work with your enemy'. Together they form a unique fingerprint.

Cite this