Security Protocols XXIII

  • Clark S
ISSN: 16113349
N/ACitations
Citations of this article
35Readers
Mendeley users who have this article in their library.

Abstract

So we’re calling this one composite privacy, and we want to talk about shifting costs for web tracking or for user tracking. In previous years at this workshop we’ve presented ideas on a variety of subjects. We’ve talked about what we can learn from locks and from safecracking, we’ve talked about eVoting systems, we talked about the benefit you get from the attackers learning curve early in a vulnerability lifecycle, we’ve talked about the P25 radio systems and the problems with those, and we’ve also presented information on the lessons you can learn from casino security, and from military strategy

Cite

CITATION STYLE

APA

Clark, S. (2015). Security Protocols XXIII. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9379, pp. 183–194). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84952759389&partnerID=tZOtx3y1%0Ahttp://link.springer.com/10.1007/978-3-319-26096-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free