000 03840nam a22006615i 4500
001 978-3-319-39028-4
003 DE-He213
005 20240423130155.0
007 cr nn 008mamaa
008 160430s2016 sz | s |||| 0|eng d
020 _a9783319390284
_9978-3-319-39028-4
024 7 _a10.1007/978-3-319-39028-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aOpen Problems in Network Security
_h[electronic resource] :
_bIFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers /
_cedited by Jan Camenisch, Doğan Kesdoğan.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aVII, 127 p. 41 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v9591
505 0 _aNetwork Security -- 1 Forwarding Accountability: A Challenging Necessity of the Future Data Plane -- A Metric for Adaptive Routing on Trustworthy Paths -- Intrusion Detection -- Early Warning Systems for Cyber Defence -- Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees -- Intrusion Detection in the Smart Grid based on an analogue technique -- Anonymous Communication -- On Building Onion Routing into Future Internet Architectures -- Anonymity Online for Everyone: What is missing for zero-effort privacy on the Internet -- Cryptography -- Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 -- The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication.
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. iNetSec is the main workshop of the IFIP working group WG 11.4; its objective is to present and discuss open problems and new research directions on all aspects related to network security. The 9 revised full papers presented in this volume were carefully reviewed and selected from 13 submissions. They were organized in topical sections named: network security; intrusion detection; anonymous communication; and cryptography. .
650 0 _aData protection.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aElectronic data processing
_xManagement.
650 0 _aComputer networks .
650 0 _aComputers and civilization.
650 0 _aApplication software.
650 1 4 _aData and Information Security.
650 2 4 _aCryptology.
650 2 4 _aIT Operations.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputers and Society.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aCamenisch, Jan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aKesdoğan, Doğan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319390277
776 0 8 _iPrinted edition:
_z9783319390291
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v9591
856 4 0 _uhttps://doi.org/10.1007/978-3-319-39028-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c185848
_d185848