{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T14:40:09Z","timestamp":1740926409348,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642192272"},{"type":"electronic","value":"9783642192289"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19228-9_5","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T05:59:53Z","timestamp":1297317593000},"page":"47-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Security: Getting to the Root of the Problem"],"prefix":"10.1007","author":[{"given":"Raphael C. -W.","family":"Phan","sequence":"first","affiliation":[]},{"given":"John N.","family":"Whitley","sequence":"additional","affiliation":[]},{"given":"David J.","family":"Parish","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","volume-title":"Building Internet Firewalls","author":"D.B. Chapman","year":"1995","unstructured":"Chapman, D.B., Zwicky, E.D., Russell, D.: Building Internet Firewalls. O\u2019Reilly & Associates, Inc., Sebastopol (1995)"},{"key":"5_CR2","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-05437-2_2","volume-title":"iNetSec 2009 \u2013 Open Research Problems in Network Security","author":"C.J. Hernandez-Castro","year":"2009","unstructured":"Hernandez-Castro, C.J., Ribagorda, A.: Remotely telling humans and computers apart: An unsolved problem. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2009. IFIP Advances in Information and Communication Technology, vol.\u00a0309, pp. 9\u201326. Springer, Heidelberg (2009)"},{"unstructured":"Kerr, C., Phaal, R., Probert, D.: A Framework for Strategic Military Capabilities in Defense Transformation. In: International Command and Control Research and Technology Symposium (2006)","key":"5_CR3"},{"unstructured":"BBC News. Political Hacktivists Turn To Web Attacks (2010), http:\/\/news.bbc.co.uk\/1\/hi\/technology\/8506698.stm; This is an electronic document. Date of publication: February 10, 2010. Date retrieved: February 10, 2010. Date last modified: February 10, 2010","key":"5_CR4"},{"unstructured":"Wu, C.-H., Huang, C.-C.A., Irwin, J.D.: Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to Against Denial Of Service Attacks and Protect User Privacy. In: Proc. SpringSim 2007, San Diego, CA, USA, pp. 362\u2013369 (2007)","key":"5_CR5"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"issue":"5799","key":"5_CR7","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1126\/science.1130992","volume":"314","author":"R. Anderson","year":"2006","unstructured":"Anderson, R., Moore, T.: The Economics of Information Security. Science\u00a0314(5799), 610\u2013613 (2006)","journal-title":"Science"},{"doi-asserted-by":"crossref","unstructured":"Barak, B., Herzberg, A., Naor, D., Shai, E.: The Proactive Security Toolkit and Applications. In: Proc. ACM CCS 1999, pp. 18\u201327 (1999)","key":"5_CR8","DOI":"10.1145\/319709.319713"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Bellare","year":"1999","unstructured":"Bellare, M., Miner, S.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 431\u2013448. Springer, Heidelberg (1999)"},{"unstructured":"Bluetooth SIG, Bluetooth Core Specifications v4.0 (December 17, 2009)","key":"5_CR10"},{"doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.Y.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proc. PDP 2002, pp. 403\u2013410 (2002)","key":"5_CR11","DOI":"10.1109\/EMPDP.2002.994321"},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S1353-4858(00)80025-2","volume":"1999","author":"F. Cohen","year":"1999","unstructured":"Cohen, F.: Managing Network Security: Returning Fire. Network Security\u00a01999(2), 11\u201315 (1999)","journal-title":"Network Security"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-36563-X_2","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"Y. Dodis","year":"2003","unstructured":"Dodis, Y., Franklin, M.K., Katz, J., Yung, M.: Intrusion-resilient public-key encryption. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol.\u00a02612, pp. 19\u201332. Springer, Heidelberg (2003)"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-46035-7_5","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"Y. Dodis","year":"2002","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 65\u201382. Springer, Heidelberg (2002)"},{"unstructured":"Ellison, C.: UPnP Security Ceremonies: Design Document (October 2003), http:\/\/www.upnp.org\/download\/standardizeddcps\/UPnPSecurityCeremonies_1_0secure.pdf","key":"5_CR15"},{"issue":"1","key":"5_CR16","first-page":"8","volume":"1999","author":"B. Gengler","year":"1999","unstructured":"Gengler, B.: Strikeback. Computer Fraud & Security\u00a01999(1), 8\u20139 (1999)","journal-title":"Computer Fraud & Security"},{"unstructured":"Johnson, B., Hirsch, A.: Facebook Backtracks after Online Privacy Protest (February 19, 2009), http:\/\/Guardian.co.uk","key":"5_CR17"},{"doi-asserted-by":"crossref","unstructured":"Karlof, C., Tygar, J.D., Wagner, D.: Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. In: Proc. NDSS 2009 (2009)","key":"5_CR18","DOI":"10.1145\/1572532.1572578"},{"doi-asserted-by":"crossref","unstructured":"Karlof, C., Tygar, J.D., Wagner, D.: Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. In: Proc. SOUPS 2009 (2009)","key":"5_CR19","DOI":"10.1145\/1572532.1572578"},{"unstructured":"Jayawal, V., Yurcik, W., Doss, D.: Internet Hack Back: Counter Attacks as Self-Defense or Vigilantism? In: Proc. ISTAS 2002 (2002)","key":"5_CR20"},{"unstructured":"Matsuura, J.H.: \u201cDigital Victim or \u201dVigilante\u201d: Legal and Ethical Limits to Online Self-Defense. In: Proc. Ethicomp 2004, pp. 629\u2013634 (2004)","key":"5_CR21"},{"unstructured":"Naor, M.: Verification of a Human in the Loop, or Identification via the Turing Test (September 1996), http:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/human_abs.html","key":"5_CR22"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-540-75670-5_11","volume-title":"Provable Security","author":"R.C.-W. Phan","year":"2007","unstructured":"Phan, R.C.-W., Choo, K.-K.R., Heng, S.-H.: Security of a leakage-resilient protocol for key establishment and mutual authentication. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol.\u00a04784, pp. 169\u2013177. Springer, Heidelberg (2007)"},{"issue":"5","key":"5_CR24","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/1230819.1241693","volume":"50","author":"B. Schneier","year":"2007","unstructured":"Schneier, B.: The Psychology of Security. Communications of the ACM\u00a050(5), 128 (2007)","journal-title":"Communications of the ACM"},{"issue":"4","key":"5_CR25","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2008.85","volume":"6","author":"B. Schneier","year":"2008","unstructured":"Schneier, B.: How the Human Brain Buys Security. IEEE Security & Privacy\u00a06(4), 80 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-540-40061-5_10","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"S. Shin","year":"2003","unstructured":"Shin, S., Kobara, K., Imai, H.: Leakage-resilient authenticated key establishment protocols. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 155\u2013172. Springer, Heidelberg (2003)"},{"key":"5_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/11535218_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"S. Vaudenay","year":"2005","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 309\u2013326. Springer, Heidelberg (2005)"},{"unstructured":"Walfish, M., Balakrishnan, H., Karger, D., Shenker, S.: DoS: Fighting Fire with Fire. In: Proc. HotNets 2005 (2005)","key":"5_CR28"},{"issue":"4","key":"5_CR29","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1145\/1151659.1159948","volume":"36","author":"M. Walfish","year":"2006","unstructured":"Walfish, M., Vutukuru, M., Balakrishnan, H., Karger, D., Shenker, S.: DDoS Defense by Offense. ACM SIGCOMM Computer Communication Review\u00a036(4), 303\u2013314 (2006)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"doi-asserted-by":"crossref","unstructured":"Welch, D.J., Buchheit, N., Ruocco, A.: Strike Back: Offensive Actions in Information Warfare. In: Proc. NSPW 1999, pp. 47\u201352 (1999)","key":"5_CR30","DOI":"10.1145\/335169.335192"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lou, W., Fang, Y.: SIP: a Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks. In: Proc. IEEE WCNC 2004, pp. 1679\u20131684 (2004)","key":"5_CR31","DOI":"10.1109\/WCNC.2004.1311805"}],"container-title":["Lecture Notes in Computer Science","Open Research Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19228-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T13:41:58Z","timestamp":1740922918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19228-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192272","9783642192289"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19228-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}