{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:30:21Z","timestamp":1743085821932,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333316"},{"type":"electronic","value":"9783642333323"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33332-3_33","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T06:43:55Z","timestamp":1348209835000},"page":"360-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Packet Inspection \u2014 Shifting the Paradigm of Fundamental Rights"],"prefix":"10.1007","author":[{"given":"Agata","family":"Kr\u00f3likowski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Boehme-Ne\u00dfler, V.: Unscharfes Grundgesetz \u2014 Anmerkungen zum Verfassungsrecht in der digitalisierten Welt. In: Institut f\u00fcr Wirtschaftsrecht, 60 Jahre Grundgesetz, pp. 155\u2013188. Kassel University Press (2010)"},{"key":"33_CR2","unstructured":"Ro\u00dfnagel, A., Mayer-Tasch, P. C., Saladin, P. V.: Radioaktiver Zerfall der Grundrechte: Zur Verfassungsvertraglichkeit der Kernenergie. Beck, M\u00fcnchen (1984)"},{"key":"33_CR3","unstructured":"Champagne, A.: Watching over you. In: Le Monde diplomatique (January 2012), \n                      http:\/\/mondediplo.com\/2012\/03\/16internet"},{"key":"33_CR4","unstructured":"Brodkin, J.: Iran reportedly blocking encrypted Internet traffic (February 2012), \n                      http:\/\/arstechnica.com\/tech-policy\/news\/2012\/02\/iran-reportedly-blocking-encrypted-internet-traffic.ars"},{"key":"33_CR5","unstructured":"Ingham, K., Forrest, S.: A History and Survey of Network Firewalls, A history and survey of network firewalls. Tech. Rep. TR-CS-2002-37, University of New Mexico Computer Science Department (2002)"},{"key":"33_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374494-4.00001-3","volume-title":"Architecture of network systems","author":"D.N. Serpanos","year":"2011","unstructured":"Serpanos, D.N., Wolf, T.: Architecture of network systems. Morgan Kaufmann, Burlington (2011)"},{"key":"33_CR7","unstructured":"Anderson, N.: Deep packet inspection meets \u2019Net neutrality, CALEA, vom 25 July (2007), \n                      http:\/\/arstechnica.com\/hardware\/news\/2007\/07\/Deep-packet-inspection-meets-net-neutrality.ars\/2"},{"key":"33_CR8","unstructured":"IEEE 802.3 Ethernet, \n                      http:\/\/standards.ieee.org\/about\/get\/802\/802.3.html"},{"key":"33_CR9","unstructured":"IEEE P802.3ba 40Gb\/s and 100Gb\/s Ethernet Task Force Public Area, \n                      http:\/\/www.ieee802.org\/3\/ba\/public\/index.html"},{"key":"33_CR10","unstructured":"Ipoque, Deep packet inspection solutions for network operators, \n                      http:\/\/ipoque.com\/en\/products\/pace-network-analysis-with-deep-packet-inspection"},{"key":"33_CR11","unstructured":"Netronome, \n                      http:\/\/www.netronome.com\/pages\/heterogeneous-architecture"},{"key":"33_CR12","unstructured":"AdvancedTCA Specifications for Next Generation Telecommunications Equipment, \n                      http:\/\/www.picmg.org\/v2internal\/resourcepage2.cfm?id=2"},{"key":"33_CR13","first-page":"255","volume-title":"CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security","author":"M. Liberatore","year":"2006","unstructured":"Liberatore, M., Levine, B.N.: Inferring the Source of Encrypted HTTP Connections. In: CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 255\u2013263. ACM Press, New York (2006)"},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1016\/j.comnet.2010.12.002","volume":"55","author":"R. Alshammari","year":"2010","unstructured":"Alshammari, R., Nur Zincir-Heywood, A.: Can encrypted traffic be identified without port number, IP addresses and payload inspection? Computer Networks\u00a055, 1326\u20131350 (2010)","journal-title":"Computer Networks"},{"key":"33_CR15","unstructured":"Hjelmvik, E., John, W.: Breaking and Improving Protocol Obfuscation, Dep. of Computer Science and Engineering, Chalmers University of Technology, Technical Report No. 2010-05 (2010) ISSN 1652- 926X, \n                      http:\/\/publications.lib.chalmers.se\/cpl\/record\/index.xsql?pubid=123751"},{"key":"33_CR16","volume-title":"Statistical Pattern Recognition","author":"A. Webb","year":"2003","unstructured":"Webb, A.: Statistical Pattern Recognition. Wiley, Chichester (2003)"},{"key":"33_CR17","unstructured":"Ipoque, Net Reporter, \n                      http:\/\/ipoque.com\/en\/products\/net-reporter"},{"key":"33_CR18","unstructured":"Procera, Products, \n                      http:\/\/www.proceranetworks.com\/pdf\/products\/overview\/Procera_Overview_Brochure_mech_2012-4-8.pdf"},{"key":"33_CR19","unstructured":"Packet Clearing House, Internet Exchange Directory, \n                      https:\/\/prefix.pch.net\/applications\/ixpdir\/?show_active_only=0&sort=traffic&order=desc"},{"issue":"4","key":"33_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/SURV.2008.080406","volume":"10","author":"T.T.T. Nguyen","year":"2008","unstructured":"Nguyen, T.T.T., Armitage, G.: A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials\u00a010(4), 56\u201376 (2008)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"33_CR21","unstructured":"Ipoque, Products, \n                      http:\/\/ipoque.com\/en\/products"},{"key":"33_CR22","unstructured":"Bendrath, R.: Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection (2009), \n                      http:\/\/userpage.fu-berlin.de\/bendrath\/ISA09_Paper_Ralf%20Bendrath_DPI.pdf"},{"key":"33_CR23","unstructured":"Plusnet, \n                      http:\/\/www.plus.net\/broadband\/?source=subBox"},{"key":"33_CR24","unstructured":"Pfanner, E.: 3 Internet Providers in Deal for Tailored Ads, \n                      http:\/\/www.nytimes.com\/2008\/02\/18\/technology\/18target.html?_r=1&oref=slogin"},{"key":"33_CR25","unstructured":"Kindsight: Subscription options, \n                      http:\/\/www.kindsight.net\/en\/solution\/subscription"},{"key":"33_CR26","unstructured":"European Council Resolution on the lawful interception of telecommunications (96\/C 329\/01), \n                      http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31996G1104:EN:HTML"},{"key":"33_CR27","doi-asserted-by":"crossref","unstructured":"Kent, S., Seo, K.: Security Architecture for the Internet Protocol, RFC 4301 (2005), \n                      http:\/\/tools.ietf.org\/html\/rfc4301","DOI":"10.17487\/rfc4301"},{"key":"33_CR28","unstructured":"Hoeren, T.: Google Analytics \u2014 datenschutzrechtlich unbedenklich? Zeitschrift f\u00fcr Datenschutz (ZD)\u00a01\/2001, 3\u20136 (2011)"},{"key":"33_CR29","unstructured":"Convention Committee on Cybercrime, Convention on Cybercrime, \n                      http:\/\/conventions.coe.int\/Treaty\/EN\/Treaties\/html\/185.htm"},{"key":"33_CR30","unstructured":"Decision of the German Federal Constitutional Court, BVerfG, 1 BvR 256\/08 vom 2.3 (March 2, 2010), \n                      http:\/\/www.bverfg.de\/entscheidungen\/rs20100302_1bvr025608.html"},{"key":"33_CR31","unstructured":"Gilroy, A.A.: Access to Broadband Networks: The Net Neutrality Debate. CRS Report for Congress (2011)"},{"key":"33_CR32","unstructured":"Dischinger, M., Marcon, M., Guha, S., Gummadi, K.P., Mahajan, R., Saroiu, S.: Glasnost: Enabling End Users to Detect Traffic Differentiation. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (2010)"},{"key":"33_CR33","doi-asserted-by":"crossref","unstructured":"Kanuparthy, P., Dovrolis, C.: Diffprobe: Detecting ISP service discrimination. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5461983"},{"key":"33_CR34","doi-asserted-by":"crossref","unstructured":"Basso, S., Servetti, A., De Martin, J.C.: The network neutrality bot architecture: a preliminary approach for self-monitoring of Internet access QoS. In: Proceedings of ISCC 2011, pp. 1131\u20131136 (2011)","DOI":"10.1109\/ISCC.2011.5983857"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Critical Infrastructures and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33332-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T05:32:02Z","timestamp":1620711122000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33332-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333316","9783642333323"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33332-3_33","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}