John Brunner postulates a technology that can record the thoughts and emotions generated by the human brain during sleep, and replay them on demand later for a third party. Isaac Asimov describes a device that can look into the past and display what actually happened. These fictional inventions raise interesting questions about the way we actually handle confidentiality and integrity of information at present, and suggest new threats and countermeasures.
|Name||Lecture Notes in Computer Science|
|Workshop||Twenty-third International Workshop on Security Protocols|
|Period||31/03/15 → 2/04/15|