
In this session, we approach the question of “security and privacy in the information economy” as computer science researchers. There are two major components to the computer science research point of view: namely that of the theorist, whose goal is to develop a rigorous mathematical theory of security and privacy, and that of the practitioner, whose goal is to build systems that are secure and private and that are widely and successfully used in the real world. After many years of working fairly independently, security theorists and security practitioners are now cooperating to meet the pressing demands of the information economy.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
