{"id":"https://openalex.org/W2898055040","doi":"https://doi.org/10.17487/rfc8462","title":"Report from the IAB Workshop on Managing Radio Networks in an Encrypted World (MaRNEW)","display_name":"Report from the IAB Workshop on Managing Radio Networks in an Encrypted World (MaRNEW)","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2898055040","doi":"https://doi.org/10.17487/rfc8462","mag":"2898055040"},"language":"en","primary_location":{"id":"doi:10.17487/rfc8462","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc8462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030186170","display_name":"Natasha Rooney","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"N. Rooney","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5030186170"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9649999737739563,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9369000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.631179928779602},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.390701025724411},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25105082988739014}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.631179928779602},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.390701025724411},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25105082988739014}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc8462","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc8462","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880"],"abstract_inverted_index":{"The":[0,78],"Internet":[1,53],"Architecture":[2],"Board":[3],"(IAB)":[4],"and":[5,61,85,135],"GSM":[6],"Association":[7],"(GSMA)":[8],"held\na":[9],"joint":[10],"workshop":[11,25],"on":[12,20,32,41],"Managing":[13],"Radio":[14],"Networks":[15],"in":[16,66,182],"an":[17],"Encrypted":[18],"World\n(MaRNEW),":[19],"September":[21],"24-25,":[22],"2015.":[23],"This":[24],"aimed":[26],"to":[27,108,152,170],"discuss\nsolutions":[28],"for":[29,35],"bandwidth":[30],"optimisation":[31],"mobile":[33,147],"networks":[34],"encrypted\ncontent,":[36],"as":[37,116,118],"current":[38,82,124],"solutions":[39,175],"rely":[40],"unencrypted":[42],"content":[43,73,145],"which":[44,97,178],"is":[45],"not\nindicative":[46],"of":[47,51,95,163],"the":[48,67,81,90,92,106,109,157,161],"security":[49],"needs":[50,94],"today's":[52],"users.":[54],"The\nworkshop":[55],"gathered":[56],"IETF":[57],"attendees,":[58],"IAB":[59],"members":[60],"participants":[62],"from\nvarious":[63],"organisations":[64],"involved":[65],"telecommunications":[68],"industry\nincluding":[69],"original":[70],"equipment":[71],"manufacturers,":[72],"providers,":[74],"and\nmobile":[75],"network":[76,107],"operators.":[77],"group":[79],"discussed":[80,115,155,181],"Internet\nencryption":[83],"trends":[84],"deployment":[86],"issues":[87,162],"identified":[88],"within":[89],"IETF,\nand":[91],"privacy":[93,167],"users":[96],"should":[98],"be":[99,180],"adhered.":[100],"Solutions\ndesigned":[101],"around":[102],"sharing":[103],"data":[104],"from":[105],"endpoints":[110],"and\nvice":[111],"versa":[112],"were":[113,176],"then":[114],"well":[117],"analysing":[119],"whether":[120],"issues\nexperienced":[121],"when":[122],"using":[123],"transport":[125],"layer":[126],"protocols":[127],"are":[128],"also\nplaying":[129],"a":[130],"role":[131],"here.":[132],"Content":[133],"providers":[134],"CDNs":[136],"gave":[137],"their":[138,141,144],"own":[139],"views\nof":[140],"experiences":[142],"delivering":[143],"with":[146],"network\noperators.":[148],"Finally,":[149],"technical":[150],"responses":[151],"regulation":[153],"was":[154],"to\nhelp":[156],"regulated":[158],"industries":[159],"relay":[160],"impossible-to-\nimplement":[164],"or":[165],"bad-for-":[166],"technologies":[168],"back":[169],"regulators.":[171],"A":[172],"group\nof":[173],"suggested":[174],"devised":[177],"will":[179],"various\nIETF":[183],"groups":[184],"moving":[185],"forward.":[186]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
