default search action
Search dblp for Publications
export results for "toc:db/conf/ifip11-4/inetsec2015.bht:"
@proceedings{DBLP:conf/ifip11-4/2015, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39028-4}, doi = {10.1007/978-3-319-39028-4}, isbn = {978-3-319-39027-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/AsoniCBP15, author = {Daniele Enrico Asoni and Chen Chen and David Barrera and Adrian Perrig}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {On Building Onion Routing into Future Internet Architectures}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {71--81}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_6}, doi = {10.1007/978-3-319-39028-4\_6}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/AsoniCBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/HerrmannLZF15, author = {Dominik Herrmann and Jens Lindemann and Ephraim Zimmer and Hannes Federrath}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Anonymity Online for Everyone: What Is Missing for Zero-Effort Privacy on the Internet?}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {82--94}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_7}, doi = {10.1007/978-3-319-39028-4\_7}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-4/HerrmannLZF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/HofmannFS15, author = {Christoph Hofmann and Elke Franz and Silvia Santini}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {A Metric for Adaptive Routing on Trustworthy Paths}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {11--25}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_2}, doi = {10.1007/978-3-319-39028-4\_2}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-4/HofmannFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/KalutarageSLLY15, author = {Harsha K. Kalutarage and Siraj Ahmed Shaikh and Bu{-}Sung Lee and Chonho Lee and Chai Kiat Yeo}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Early Warning Systems for Cyber Defence}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {29--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_3}, doi = {10.1007/978-3-319-39028-4\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-4/KalutarageSLLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/MihajloskaGS15, author = {Hristina Mihajloska and Danilo Gligoroski and Simona Samardjiska}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on {SHA-3}}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {97--111}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_8}, doi = {10.1007/978-3-319-39028-4\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/MihajloskaGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/PappasRP15, author = {Christos Pappas and Raphael M. Reischuk and Adrian Perrig}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Forwarding Accountability: {A} Challenging Necessity of the Future Data Plane}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {3--10}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_1}, doi = {10.1007/978-3-319-39028-4\_1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/PappasRP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/RichthammerR15, author = {Hartmut Richthammer and Sebastian Reif}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Intrusion Detection in the Smart Grid Based on an Analogue Technique}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {56--67}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_5}, doi = {10.1007/978-3-319-39028-4\_5}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/RichthammerR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/Vukolic15, author = {Marko Vukolic}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. {BFT} Replication}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {112--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_9}, doi = {10.1007/978-3-319-39028-4\_9}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/Vukolic15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/ZimmerLHF15, author = {Ephraim Zimmer and Jens Lindemann and Dominik Herrmann and Hannes Federrath}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Catching Inside Attackers: Balancing Forensic Detectability and Privacy of Employees}, booktitle = {Open Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9591}, pages = {43--55}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-39028-4\_4}, doi = {10.1007/978-3-319-39028-4\_4}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-4/ZimmerLHF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.