Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)
Beyond Trust (Transcript of Discussion)
The motion before us in this workshop is that attackers now control so much of the infrastructure that it’s impossible to do anything without their active cooperation.
KeywordsUtility Function Game Theory Dominant Strategy Trust Relationship Side Payment
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
© Springer International Publishing Switzerland 2014