Conclusions
Architecture works
Users and providers may not like it
But its optimal
Security fairly simple
Implementation Hard
Need User Trials
Need to fill in some technical details (protocol engineering)
Trust level tricky
Previous slide
Back to first slide
View graphic version