So we’re calling this one composite privacy, and we want to talk about shifting costs for web tracking or for user tracking. In previous years at this workshop we’ve presented ideas on a variety of subjects. We’ve talked about what we can learn from locks and from safecracking, we’ve talked about eVoting systems, we talked about the benefit you get from the attackers learning curve early in a vulnerability lifecycle, we’ve talked about the P25 radio systems and the problems with those, and we’ve also presented information on the lessons you can learn from casino security, and from military strategy
CITATION STYLE
Clark, S. (2015). Security Protocols XXIII. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9379, pp. 183–194). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84952759389&partnerID=tZOtx3y1%0Ahttp://link.springer.com/10.1007/978-3-319-26096-9
Mendeley helps you to discover research relevant for your work.