Abstract
What an honour to be the person not talking about how to replace passwords [laughter]. I was struggling to come up with a metaphor for why I’m giving this talk after Frank’s talk, this was the best I could do. Does anybody know why I chose this?
Jonathan Anderson: Is that the fighter they had at the end of the war?
Reply: It is, yes. Towards the end of World War 2, the Americans started putting Merlin engines on to the P-51, which is still the most popular propeller plane for hobby pilots trying to acquire, and produced essentially the highest-performance propeller plane ever built This was in 1943, and it was the only time that we really perfected the art of getting a piston engine to make a plane go very, very fast. The Germans hadn’t invested in making a fighter of this generation because they were so caught up in making jet fighters, which you see coming down in flames in the background. By this point in history designers knew that propeller planes would be gone within ten years and jets would replace them for all the reasons that we use jets now, but in that window propeller planes were still a lot better: there were huge reliability problems and other issues with jets, and they couldn’t quite get to the performance that the best propeller planes had.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bonneau, J. (2011). Getting Web Authentication Right (Transcript of Discussion). In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds) Security Protocols XIX. Security Protocols 2011. Lecture Notes in Computer Science, vol 7114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25867-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-25867-1_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25866-4
Online ISBN: 978-3-642-25867-1
eBook Packages: Computer ScienceComputer Science (R0)