↓ Skip to main content

Computer Security – ESORICS 2005

Overview of attention for book
Cover of 'Computer Security – ESORICS 2005'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Computerized Voting Machines: A View from the Trenches
  3. Altmetric Badge
    Chapter 2 XML Access Control with Policy Matching Tree
  4. Altmetric Badge
    Chapter 3 Semantic Access Control Model: A Formal Specification
  5. Altmetric Badge
    Chapter 4 A Generic XACML Based Declarative Authorization Scheme for Java
  6. Altmetric Badge
    Chapter 5 Specification and Validation of Authorisation Constraints Using UML and OCL
  7. Altmetric Badge
    Chapter 6 Unified Index for Mobile Object Data and Authorizations
  8. Altmetric Badge
    Chapter 7 On Obligations
  9. Altmetric Badge
    Chapter 8 Computer Security – ESORICS 2005
  10. Altmetric Badge
    Chapter 9 Machine-Checked Security Proofs of Cryptographic Signature Schemes
  11. Altmetric Badge
    Chapter 10 Sanitizable Signatures
  12. Altmetric Badge
    Chapter 11 Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
  13. Altmetric Badge
    Chapter 12 Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
  14. Altmetric Badge
    Chapter 13 Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
  15. Altmetric Badge
    Chapter 14 Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
  16. Altmetric Badge
    Chapter 15 An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts
  17. Altmetric Badge
    Chapter 16 Towards a Theory of Intrusion Detection
  18. Altmetric Badge
    Chapter 17 On Scalability and Modularisation in the Modelling of Network Security Systems
  19. Altmetric Badge
    Chapter 18 Sybil-Resistant DHT Routing
  20. Altmetric Badge
    Chapter 19 Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
  21. Altmetric Badge
    Chapter 20 Quantifying Probabilistic Information Flow in Computational Reactive Systems
  22. Altmetric Badge
    Chapter 21 Enforcing Non-safety Security Policies with Program Monitors
  23. Altmetric Badge
    Chapter 22 Soundness of Formal Encryption in the Presence of Key-Cycles
  24. Altmetric Badge
    Chapter 23 Privacy Preserving Clustering
  25. Altmetric Badge
    Chapter 24 Abstractions Preserving Parameter Confidentiality
  26. Altmetric Badge
    Chapter 25 Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
  27. Altmetric Badge
    Chapter 26 Security Notions for Disk Encryption
  28. Altmetric Badge
    Chapter 27 Local View Attack on Anonymous Communication
  29. Altmetric Badge
    Chapter 28 Browser Model for Security Analysis of Browser-Based Protocols
Attention for Chapter 8: Computer Security – ESORICS 2005
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age and source

Mentioned by

wikipedia
1 Wikipedia page

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
86 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Computer Security – ESORICS 2005
Chapter number 8
Book title
Computer Security – ESORICS 2005
Published in
Lecture notes in computer science, January 2005
DOI 10.1007/11555827_8
Book ISBNs
978-3-54-028963-0, 978-3-54-031981-8
Authors

Sabrina de Capitani di Vimercati, Paul Syverson, Dieter Gollmann, David Chaum, Peter Y. A. Ryan, Steve Schneider, Chaum, David, Ryan, Peter Y. A., Schneider, Steve

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 86 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 2 2%
Germany 1 1%
Chile 1 1%
Singapore 1 1%
Denmark 1 1%
United States 1 1%
Luxembourg 1 1%
Unknown 78 91%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 21 24%
Student > Master 17 20%
Researcher 12 14%
Professor > Associate Professor 7 8%
Student > Postgraduate 5 6%
Other 16 19%
Unknown 8 9%
Readers by discipline Count As %
Computer Science 65 76%
Engineering 5 6%
Social Sciences 3 3%
Energy 1 1%
Mathematics 1 1%
Other 2 2%
Unknown 9 10%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 30 May 2021.
All research outputs
#7,486,475
of 22,884,315 outputs
Outputs from Lecture notes in computer science
#2,487
of 8,127 outputs
Outputs of similar age
#36,085
of 139,886 outputs
Outputs of similar age from Lecture notes in computer science
#49
of 132 outputs
Altmetric has tracked 22,884,315 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,127 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 54% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 139,886 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 17th percentile – i.e., 17% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 132 others from the same source and published within six weeks on either side of this one. This one is in the 37th percentile – i.e., 37% of its contemporaries scored the same or lower than it.