000 03572nam a22005895i 4500
001 978-3-319-39028-4
003 DE-He213
005 20200421112224.0
007 cr nn 008mamaa
008 160430s2016 gw | s |||| 0|eng d
020 _a9783319390284
_9978-3-319-39028-4
024 7 _a10.1007/978-3-319-39028-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aOpen Problems in Network Security
_h[electronic resource] :
_bIFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers /
_cedited by Jan Camenisch, Doğan Kesdoğan.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aVII, 127 p. 41 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v9591
505 0 _aNetwork Security -- 1 Forwarding Accountability: A Challenging Necessity of the Future Data Plane -- A Metric for Adaptive Routing on Trustworthy Paths -- Intrusion Detection -- Early Warning Systems for Cyber Defence -- Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees -- Intrusion Detection in the Smart Grid based on an analogue technique -- Anonymous Communication -- On Building Onion Routing into Future Internet Architectures -- Anonymity Online for Everyone: What is missing for zero-effort privacy on the Internet -- Cryptography -- Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 -- The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication.
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. iNetSec is the main workshop of the IFIP working group WG 11.4; its objective is to present and discuss open problems and new research directions on all aspects related to network security. The 9 revised full papers presented in this volume were carefully reviewed and selected from 13 submissions. They were organized in topical sections named: network security; intrusion detection; anonymous communication; and cryptography. .
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 0 _aComputers and civilization.
650 0 _aManagement information systems.
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aData Encryption.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputers and Society.
650 2 4 _aInformation Systems Applications (incl. Internet).
700 1 _aCamenisch, Jan.
_eeditor.
700 1 _aKesdoğan, Doğan.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319390277
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v9591
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-39028-4
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c57584
_d57584