![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand
The working group WG 11.4 of IFIP ran an iNetSec conference a few times in the past, sometimes together with IFIP security conference, sometimes as a stand-alone workshop with a program selected from peer-reviewed submissions. When we were elected to chair WG 11.4 we asked ourselveswhether the security and also the computer science community at large bene?ts from this workshop. In particular, as there aremany (too many?) securityconferences, it has become di?cult to keep up with the ?eld. After having talked to many colleagues, far too many to list all of them here, we decided to try a di?erent kind of workshop: one where people would attend to discuss open research topics in our ?eld, as typically only happens during the co?ee breaks of ordinary conferences. Toenablethiswecalledforabstractsof2pageswheretheauthorsoutlinethe open problems that they would like to discuss at the workshop, the intent being that the author would be given 15 minutes to present the topic and another 15 minutes for discussion. These abstracts were then read by all members of the Program Committee and ranked by them according to whether they thought thiswouldleadtoaninterestingtalk and discussion. We then simply selected the abstracts that got the best rankings. We were happy to see this result in many really interesting talks and disc- sions in the courseof the workshop.Ofcourse, these lively anddirect discussions are almost impossible to achieve in a printed text. Still, we asked the authors to distill the essence of these discussions into full papers. The results are in your hand
This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. iNetSec is the main workshop of the IFIP working group WG 11.4; its objective is to present and discuss open problems and new research directions on all aspects related to network security. The 9 revised full papers presented in this volume were carefully reviewed and selected from 13 submissions. They were organized in topical sections named: network security; intrusion detection; anonymous communication; and cryptography.
Das Buch fuhrt den Leser in die grundlegenden Techniken und Sicherheitsmodelle zum Schutz der Privatsphare ein und erlautert deren Anwendung in offenen Umgebungen (insb. Internet). Folgende Punkte kennzeichnen das Buch: - Kryptographie (Schutz der Nachrichteninhalte) und deren Sicherheitsmodelle werden im Zusammenhang mit der Anwendung (Schlusselverteilproblematik) erlautert. - Schutz der Kommunikationsumstande (wer kommuniziert von wo, wann, mit wem, wohin) wird erstmals mit einer umfassenden Sicherheitsmodellierung dargestellt und der Zusammenhang mit der Anwendung (Problematik bei der Gruppenbildung) aufgezeigt. - Der probabilistische Schutz und die Stop-And-Go-MIXe werden analog zu der asymmetrischen Kryptographie und komplexitatstheoretischen Sicherheit eingefuhrt. - Die Leistungsfahigkeit der Anonymisierungsverfahren und eine Pilotimplementierung werden vorgestellt. Besonderer Vorzug des Buches ist daruber hinaus, dass es auch fur den Nichtfachmann verstandlich geschrieben ist.
|
![]() ![]() You may like...
Financial and Macroeconomic…
Francis X. Diebold, Kamil Yilmaz
Hardcover
R3,864
Discovery Miles 38 640
The Thomas Merton Encyclopedia
William Shannon, Christine M. Bochen, …
Paperback
|