Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers

Author:   Jan Camenisch ,  Doğan Kesdoğan
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2016
Volume:   9591
ISBN:  

9783319390277


Pages:   127
Publication Date:   01 May 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Open Problems in Network Security: IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Jan Camenisch ,  Doğan Kesdoğan
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2016
Volume:   9591
Dimensions:   Width: 15.50cm , Height: 0.70cm , Length: 23.50cm
Weight:   2.175kg
ISBN:  

9783319390277


ISBN 10:   3319390279
Pages:   127
Publication Date:   01 May 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Network Security.- 1 Forwarding Accountability: A Challenging Necessity of the Future Data Plane.- A Metric for Adaptive Routing on Trustworthy Paths.- Intrusion Detection.- Early Warning Systems for Cyber Defence.- Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees.- Intrusion Detection in the Smart Grid based on an analogue technique.- Anonymous Communication.- On Building Onion Routing into Future Internet Architectures.- Anonymity Online for Everyone: What is missing for zero-effort privacy on the Internet.- Cryptography.- Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3.- The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List