Potential Impacts of a Growing Gap Between Theory and Practice in Information Security

(Extended Abstract)
  • Yvo Desmedt
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3574)


We have seen an explosion in the number of: conferences and workshops on all aspects of information security, topics studied in this field, and papers published. At the same time we have only seen a few widely deployed applications of this research. Meanwhile, computers are becoming less secure and criminals are exploiting new tricks. So, there is clearly a gap between theory and practice in information security. In this paper we analyze it and discuss the potential impacts of this gap.


Information Security Computer Security Address Privacy Security Expert Electronic Vote 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Knuth, D.E.: The Art of Computer Programming. Fundamental Algorithms, vol. 1. Addison-Wesley, Reading (1973)Google Scholar
  2. 2.
    Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.: Analysis of an electronic voting system. In: Proceedings IEEE Symposium on Security and Privacy, Oakland, California, May 2004, pp. 27–42. IEEE Computer Society, Los Alamitos (2004)CrossRefGoogle Scholar
  3. 3.
    Assessment of department of defense basic research. National Research Council (2005),
  4. 4.
    Report of the national workshop on internet voting (March 2001),
  5. 5.
    Schneier, B.: Applied Cryptography, 1st edn., J. Wiley, New York (1994)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yvo Desmedt
    • 1
  1. 1.University College LondonUK

Personalised recommendations