000 03957nam a22006615i 4500
001 978-3-319-39028-4
003 DE-He213
005 20240730201720.0
007 cr nn 008mamaa
008 160430s2016 sz | s |||| 0|eng d
020 _a9783319390284
_9978-3-319-39028-4
024 7 _a10.1007/978-3-319-39028-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aOpen Problems in Network Security
_h[electronic resource] :
_bIFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers /
_cedited by Jan Camenisch, Doğan Kesdoğan.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aVII, 127 p. 41 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v9591
505 0 _aNetwork Security -- 1 Forwarding Accountability: A Challenging Necessity of the Future Data Plane -- A Metric for Adaptive Routing on Trustworthy Paths -- Intrusion Detection -- Early Warning Systems for Cyber Defence -- Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees -- Intrusion Detection in the Smart Grid based on an analogue technique -- Anonymous Communication -- On Building Onion Routing into Future Internet Architectures -- Anonymity Online for Everyone: What is missing for zero-effort privacy on the Internet -- Cryptography -- Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 -- The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication.
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. iNetSec is the main workshop of the IFIP working group WG 11.4; its objective is to present and discuss open problems and new research directions on all aspects related to network security. The 9 revised full papers presented in this volume were carefully reviewed and selected from 13 submissions. They were organized in topical sections named: network security; intrusion detection; anonymous communication; and cryptography. .
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aElectronic data processing
_xManagement.
_9168421
650 0 _aComputer networks .
_931572
650 0 _aComputers and civilization.
_921733
650 0 _aApplication software.
_9168422
650 1 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputer Communication Networks.
_9168423
650 2 4 _aComputers and Society.
_931668
650 2 4 _aComputer and Information Systems Applications.
_9168424
700 1 _aCamenisch, Jan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168425
700 1 _aKesdoğan, Doğan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168426
710 2 _aSpringerLink (Online service)
_9168427
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319390277
776 0 8 _iPrinted edition:
_z9783319390291
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v9591
_9168428
856 4 0 _uhttps://doi.org/10.1007/978-3-319-39028-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96674
_d96674