Abstract
The motion before us in this workshop is that attackers now control so much of the infrastructure that it’s impossible to do anything without their active cooperation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Living in an Impossible World.
- 2.
Even though we can’t do without them.
- 3.
See for example Robert Stalnaker, “Knowledge, Belief and Counterfactual Reasoning in Games”, Economics and Philosophy, 12(1996), 133–162.
- 4.
cf Andrew Loeb in Cryptonomicon.
- 5.
For background see Touchette and Lloyd, “Information-theoretic Approach to the Study of Control Systems”, arXiv:physics/0104007v2 [physics.data-an].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Das Chowdhury, P. (2014). Beyond Trust (Transcript of Discussion). In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-12400-1_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12399-8
Online ISBN: 978-3-319-12400-1
eBook Packages: Computer ScienceComputer Science (R0)