How does match-fixing inform computer game security? (transcript of discussion)

Jeff Yan*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

This article is a curated transcription of the discussion that took place at the workshop when the author presented the paper.

Original languageEnglish
Title of host publicationSecurity Protocols XXVI - 26th International Workshop, Revised Selected Papers
EditorsVashek Matyáš, Petr Švenda, Jonathan Anderson, Bruce Christianson, Frank Stajano
Place of PublicationCham
PublisherSpringer-Verlag
Pages171-178
Number of pages8
ISBN (Print)9783030032500
DOIs
Publication statusPublished - 24 Nov 2018
Event26th International Workshop on Security Protocols, 2018 - Cambridge, United Kingdom
Duration: 19 Mar 201821 Mar 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11286 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference26th International Workshop on Security Protocols, 2018
Country/TerritoryUnited Kingdom
CityCambridge
Period19/03/1821/03/18

Keywords

  • computer games
  • network security
  • match-fixing
  • workshop

Fingerprint

Dive into the research topics of 'How does match-fixing inform computer game security? (transcript of discussion)'. Together they form a unique fingerprint.

Cite this