↓ Skip to main content

Security Protocols

Overview of attention for book
Cover of 'Security Protocols'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Security Protocols
  3. Altmetric Badge
    Chapter 2 Protocols using anonymous connections: Mobile applications
  4. Altmetric Badge
    Chapter 3 Receipt-free electronic voting schemes for large scale elections
  5. Altmetric Badge
    Chapter 4 Flexible internet secure transactions based on collaborative domains
  6. Altmetric Badge
    Chapter 5 How to build evidence in a public-key infrastructure for multi-domain environments
  7. Altmetric Badge
    Chapter 6 On signature schemes with threshold verification detecting malicious verifiers
  8. Altmetric Badge
    Chapter 7 Open key exchange: How to defeat dictionary attacks without encrypting public keys
  9. Altmetric Badge
    Chapter 8 Protocol interactions and the chosen protocol attack
  10. Altmetric Badge
    Chapter 9 Binding bit patterns to real world entities
  11. Altmetric Badge
    Chapter 10 Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
  12. Altmetric Badge
    Chapter 11 Security Protocols
  13. Altmetric Badge
    Chapter 12 Entity authentication and authenticated key transport protocols employing asymmetric techniques
  14. Altmetric Badge
    Chapter 13 SG logic — a formal analysis technique for authentication protocols
  15. Altmetric Badge
    Chapter 14 How to convert any digital signature scheme into a group signature scheme
  16. Altmetric Badge
    Chapter 15 Threshold key-recovery systems for RSA
  17. Altmetric Badge
    Chapter 16 A weakness of the Menezes-Vanstone cryptosystem
  18. Altmetric Badge
    Chapter 17 On ideal non-perfect secret sharing schemes
Attention for Chapter 8: Protocol interactions and the chosen protocol attack
Altmetric Badge

Mentioned by

patent
1 patent

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
34 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Protocol interactions and the chosen protocol attack
Chapter number 8
Book title
Security Protocols
Published by
Springer, Berlin, Heidelberg, April 1997
DOI 10.1007/bfb0028162
Book ISBNs
978-3-54-064040-0, 978-3-54-069688-9
Authors

John Kelsey, Bruce Schneier, David Wagner

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 34 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 2 6%
Unknown 32 94%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 14 41%
Other 4 12%
Researcher 3 9%
Student > Master 3 9%
Student > Bachelor 2 6%
Other 4 12%
Unknown 4 12%
Readers by discipline Count As %
Computer Science 24 71%
Engineering 5 15%
Philosophy 1 3%
Unknown 4 12%