Editors:
Fast-track conference proceedings
State-of-the-art research
Up-to-date results
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6442)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): GameSec: International Conference on Decision and Game Theory for Security
Conference proceedings info: GameSec 2010.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (18 papers)
-
Front Matter
-
Security Investments and Planning
-
Authorization and Authentication
-
Theory and Algorithms for Security
-
Back Matter
About this book
Keywords
- algorithms
- approximate algorithms
- game theory
- information security
- networked control systems
- optimization
- security
- algorithm analysis and problem complexity
Editors and Affiliations
-
Deutsche Telekom Laboratories, Technische Universität Berlin, Berlin, Germany
Tansu Alpcan
-
Laboratory of Cryptography and System Security (CrySyS), Budapest University of Technology and Economics, Budapest, Hungary
Levente Buttyán
-
Department of Electrical and Computer Engineering, University of Maryland, College Park, USA
John S. Baras
Bibliographic Information
Book Title: Decision and Game Theory for Security
Book Subtitle: First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings
Editors: Tansu Alpcan, Levente Buttyán, John S. Baras
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-17197-0
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-17196-3Published: 16 November 2010
eBook ISBN: 978-3-642-17197-0Published: 23 November 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 281
Number of Illustrations: 60 b/w illustrations
Topics: Cryptology, Game Theory, Computer Communication Networks, Data and Information Security, Algorithms, IT Operations