Legal Data Security

CS 463/480 Lecture, Dr. Lawlor

Authentication gets very difficult when the person being authenticated doesn't *want* to be authenticated.  For example: