@inbook{6e6a3be3216346b6a01e2197b7818ea1,
title = "Strange bedfellows: How and when to work with your enemy",
abstract = "There are many examples of parties that are seemingly in opposition working together. In this position paper, we explore this in the context of security protocols with an emphasis on how these examples might produce long-term benefits for the “good guys” and how a formal model might be used to help prescribe approaches to collaboration with the “bad guys.”.",
author = "Jaggard, {Aaron D.} and Wright, {Rebecca N.}",
note = "Funding Information: Work supported by ONR and DARPA. Funding Information: Work partially carried out with support from the National Science Foundation under grants CNS-1018557 and CCF-1101690. Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2014.",
year = "2014",
doi = "10.1007/978-3-319-12400-1_25",
language = "English (US)",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "263--267",
editor = "Frank Stajano and Vashek Maty{\'a}{\v s} and Petr {\v S}venda and Jonathan Anderson and Bruce Christianson and James Malcolm",
booktitle = "Security Protocols XXII - 22nd International Workshop, Revised Selected Papers",
address = "Germany",
}