LEADER 02419nam 2200493 450 001 9910686468503321 005 20230731000154.0 010 $a3-031-30731-3 024 7 $a10.1007/978-3-031-30731-7 035 $a(CKB)5840000000241982 035 $a(DE-He213)978-3-031-30731-7 035 $a(MiAaPQ)EBC7236627 035 $a(Au-PeEL)EBL7236627 035 $a(PPN)269655301 035 $a(EXLCZ)995840000000241982 100 $a20230731d2023 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSecurity standardisation research $e8th international conference, SSR 2023, Lyon, France, April 22-23, 2023, proceedings /$fFelix Gu?nther and Julia Hesse, editors 205 $a1st ed. 2023. 210 1$aCham, Switzerland :$cSpringer,$d[2023] 210 4$dİ2023 215 $a1 online resource (IX, 153 p. 44 illus., 18 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13895 311 $a3-031-30730-5 320 $aIncludes bibliographical references and index. 327 $aQuantum-resistant MACsec and IPsec for Virtual Private Networks -- Post-Quantum Security for the Extended Access Control Protocol -- A study of KEM generalizations -- Vision Paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments -- On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT -- SoK: Anonymous Credentials. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023. The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13895 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 702 $aGu?nther$b Felix 702 $aHesse$b Julia 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910686468503321 996 $aSecurity standardisation research$92065770 997 $aUNINA LEADER 01817oam 2200505zu 450 001 9910376115403321 005 20210807002101.0 035 $a(CKB)3170000000004301 035 $a(SSID)ssj0001174926 035 $a(PQKBManifestationID)11977504 035 $a(PQKBTitleCode)TC0001174926 035 $a(PQKBWorkID)11116008 035 $a(PQKB)11634979 035 $a(WaSeSS)IndRDA00018207 035 $a(Association for Computing Machinery)10.5555/1808143 035 $a(EXLCZ)993170000000004301 100 $a20160829d2010 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aProceedings of the 3rd International ICST Conference on Simulation Tools and Techniques 210 31$a[Place of publication not identified]$cICST Institute for Computer Sciences Social Informatics and Telecommunications Engineering$d2010 215 $a1 online resource (598 pages) 225 1 $aACM Other conferences 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a963-9799-87-4 410 0$aACM Other conferences 517 1 $aSIMUTools '10 517 1 $a3rd International Conference on Simulation Tools and Techniques, Malaga, Spain - March 16 - 18, 2010 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 700 $aLiu$b Jason$0868272 702 $aStea$b Giovanni 702 $aLiu$b Jason 702 $aPerrone$b L. Felipe 712 02$aAssociation for Computing Machinery-Digital Library. 801 0$bPQKB 906 $aBOOK 912 $a9910376115403321 996 $aProceedings of the 3rd International ICST Conference on Simulation Tools and Techniques$91938264 997 $aUNINA