Abstract
In previous chapters we have shown how to apply game theory to deal with the privacy issues in different scenarios. Here in this chapter we make a summarization for the proposed approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Xu, L., Jiang, C., Qian, Y., Ren, Y. (2018). Conclusion. In: Data Privacy Games. Springer, Cham. https://doi.org/10.1007/978-3-319-77965-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-77965-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77964-5
Online ISBN: 978-3-319-77965-2
eBook Packages: Computer ScienceComputer Science (R0)