Skip to main content

On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion)

  • Conference paper
  • First Online:
Book cover Security Protocols XXII (Security Protocols 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Included in the following conference series:

  • 714 Accesses

Abstract

When I read that the theme of this year’s workshop started with “now that all our paranoid dreams of the last 20 years have come true,” I assumed that that meant that this workshop was about the surveillance morass. That’s because I am obsessed with the surveillance morass. Now that I’m here, I realize that, regardless of the official theme, this workshop is about whatever the participants are obsessed with. So I guess Jérémie’s and my paper is in scope.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joan Feigenbaum .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Feigenbaum, J., Koenig, J. (2014). On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion). In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics