Abstract
My coauthor Brad Rosen is a former student of mine who took a course I gave in 2003 entitled Sensitive Information in a Wired World.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Slide deck available at http://www.cs.yale.edu/homes/jf/JF-Cambridge2015.pptx.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Feigenbaum, J. (2015). On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion). In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-26096-9_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26095-2
Online ISBN: 978-3-319-26096-9
eBook Packages: Computer ScienceComputer Science (R0)