↓ Skip to main content

Computer Security – ESORICS 2016

Overview of attention for book
Cover of 'Computer Security – ESORICS 2016'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors
  3. Altmetric Badge
    Chapter 2 More Practical and Secure History-Independent Hash Tables
  4. Altmetric Badge
    Chapter 3 On Manufacturing Resilient Opaque Constructs Against Static Analysis
  5. Altmetric Badge
    Chapter 4 Robust Password-Protected Secret Sharing
  6. Altmetric Badge
    Chapter 5 Compiling Low Depth Circuits for Practical Secure Computation
  7. Altmetric Badge
    Chapter 6 Secure Computation of MIPS Machine Code
  8. Altmetric Badge
    Chapter 7 Insynd: Improved Privacy-Preserving Transparency Logging
  9. Altmetric Badge
    Chapter 8 Secure Logging Schemes and Certificate Transparency
  10. Altmetric Badge
    Chapter 9 Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms
  11. Altmetric Badge
    Chapter 10 Efficient Numerical Frameworks for Multi-objective Cyber Security Planning
  12. Altmetric Badge
    Chapter 11 On Bitcoin Security in the Presence of Broken Cryptographic Primitives
  13. Altmetric Badge
    Chapter 12 DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities
  14. Altmetric Badge
    Chapter 13 When Are Three Voters Enough for Privacy Properties?
  15. Altmetric Badge
    Chapter 14 Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
  16. Altmetric Badge
    Chapter 15 LeiA: A Lightweight Authentication Protocol for CAN
  17. Altmetric Badge
    Chapter 16 Privacy, Discovery, and Authentication for the Internet of Things
  18. Altmetric Badge
    Chapter 17 Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices
  19. Altmetric Badge
    Chapter 18 Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of Things
  20. Altmetric Badge
    Chapter 19 Information Control by Policy-Based Relational Weakening Templates
  21. Altmetric Badge
    Chapter 20 Quantifying Location Privacy Leakage from Transaction Prices
  22. Altmetric Badge
    Chapter 21 A Formal Treatment of Privacy in Video Data
  23. Altmetric Badge
    Chapter 22 On Attacker Models and Profiles for Cyber-Physical Systems
  24. Altmetric Badge
    Chapter 23 Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders
  25. Altmetric Badge
    Chapter 24 Safeguarding Structural Controllability in Cyber-Physical Control Systems
  26. Altmetric Badge
    Chapter 25 The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor
  27. Altmetric Badge
    Chapter 26 Autocomplete Injection Attack
  28. Altmetric Badge
    Chapter 27 Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStore
  29. Altmetric Badge
    Chapter 28 Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently
  30. Altmetric Badge
    Chapter 29 Server-Aided Revocable Attribute-Based Encryption
  31. Altmetric Badge
    Chapter 30 Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control
Attention for Chapter 16: Privacy, Discovery, and Authentication for the Internet of Things
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age
  • Above-average Attention Score compared to outputs of the same age and source (53rd percentile)

Mentioned by

2 X users
1 Facebook page


2 Dimensions

Readers on

109 Mendeley
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Privacy, Discovery, and Authentication for the Internet of Things
Chapter number 16
Book title
Computer Security – ESORICS 2016
Published in
Lecture notes in computer science, September 2016
DOI 10.1007/978-3-319-45741-3_16
Book ISBNs
978-3-31-945740-6, 978-3-31-945741-3

David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh


Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, Catherine Meadows

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 109 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Italy 1 <1%
Unknown 108 99%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 37 34%
Student > Master 20 18%
Researcher 11 10%
Student > Bachelor 8 7%
Student > Doctoral Student 7 6%
Other 12 11%
Unknown 14 13%
Readers by discipline Count As %
Computer Science 77 71%
Engineering 10 9%
Social Sciences 3 3%
Immunology and Microbiology 1 <1%
Business, Management and Accounting 1 <1%
Other 1 <1%
Unknown 16 15%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 29 September 2016.
All research outputs
of 22,890,496 outputs
Outputs from Lecture notes in computer science
of 8,127 outputs
Outputs of similar age
of 321,166 outputs
Outputs of similar age from Lecture notes in computer science
of 504 outputs
Altmetric has tracked 22,890,496 research outputs across all sources so far. This one is in the 41st percentile – i.e., 41% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,127 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 50% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 321,166 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 47th percentile – i.e., 47% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 504 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 53% of its contemporaries.