@inproceedings{7006141199a840719cb38db29c734432,
title = "Privacy amplification with social networks (transcript of discussion)",
abstract = "Alice shares a weak human guessable secret with Bob, and would like to amplify it before applying it to application security needs. Alice in turn wants to make sure that Bob is not dodgy; so what is dodgy, we'll have to define that. I specified the context just now, both of them are part of a decentralised network, consisting of CPU constrained devices, and they are also connected to each other by a social network. So the idea here is that Alice has to use the social network to ensure that Bob is not a dodgy character, and how is she going to do that, is what we want to see.",
keywords = "social network, short path, random walk, mesh network, common node",
author = "Shishir Nagaraja",
year = "2010",
month = dec,
day = "1",
doi = "10.1007/978-3-642-17773-6_8",
language = "English",
isbn = "3642177727",
volume = "5964 ",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "74--80",
editor = "{Christianson }, B. and {Crispo }, B. and {Malcolm }, {J. A.} and {Roe }, m.",
booktitle = "Security Protocols - 15th International Workshop, Revised Selected Papers",
note = "15th International Workshop on Security Protocols ; Conference date: 18-04-2007 Through 20-04-2007",
}