Beyond Trust (Transcript of Discussion)

  • Partha Das ChowdhuryEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8809)


The motion before us in this workshop is that attackers now control so much of the infrastructure that it’s impossible to do anything without their active cooperation.


Utility Function Game Theory Dominant Strategy Trust Relationship Side Payment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.University of HertfordshireHertfordshireUK

Personalised recommendations