↓ Skip to main content

Computer Security – ESORICS 2004

Overview of attention for book
Cover of 'Computer Security – ESORICS 2004'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Incorporating Dynamic Constraints in the Flexible Authorization Framework
  3. Altmetric Badge
    Chapter 2 Access-Condition-Table-Driven Access Control for XML Databases
  4. Altmetric Badge
    Chapter 3 An Algebra for Composing Enterprise Privacy Policies
  5. Altmetric Badge
    Chapter 4 Deriving, Attacking and Defending the GDOI Protocol
  6. Altmetric Badge
    Chapter 5 Better Privacy for Trusted Computing Platforms
  7. Altmetric Badge
    Chapter 6 A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
  8. Altmetric Badge
    Chapter 7 A Formalization of Anonymity and Onion Routing
  9. Altmetric Badge
    Chapter 8 Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
  10. Altmetric Badge
    Chapter 9 Comparison Between Two Practical Mix Designs
  11. Altmetric Badge
    Chapter 10 Signature Bouquets: Immutability for Aggregated/Condensed Signatures
  12. Altmetric Badge
    Chapter 11 Towards a Theory of Data Entanglement
  13. Altmetric Badge
    Chapter 12 Portable and Flexible Document Access Control Mechanisms
  14. Altmetric Badge
    Chapter 13 Possibilistic Information Flow Control in the Presence of Encrypted Communication
  15. Altmetric Badge
    Chapter 14 Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
  16. Altmetric Badge
    Chapter 15 Security Property Based Administrative Controls
  17. Altmetric Badge
    Chapter 16 A Vector Model of Trust for Developing Trustworthy Systems
  18. Altmetric Badge
    Chapter 17 Parameterized Authentication
  19. Altmetric Badge
    Chapter 18 Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
  20. Altmetric Badge
    Chapter 19 Hindering Eavesdropping via IPv6 Opportunistic Encryption
  21. Altmetric Badge
    Chapter 20 On the Role of Key Schedules in Attacks on Iterated Ciphers
  22. Altmetric Badge
    Chapter 21 A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
  23. Altmetric Badge
    Chapter 22 A Host Intrusion Prevention System for Windows Operating Systems
  24. Altmetric Badge
    Chapter 23 Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table
  25. Altmetric Badge
    Chapter 24 ARCHERR: Runtime Environment Driven Program Safety
  26. Altmetric Badge
    Chapter 25 Sets, Bags, and Rock and Roll
  27. Altmetric Badge
    Chapter 26 Redundancy and Diversity in Security
  28. Altmetric Badge
    Chapter 27 Discovering Novel Attack Strategies from INFOSEC Alerts
Attention for Chapter 26: Redundancy and Diversity in Security
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (92nd percentile)
  • High Attention Score compared to outputs of the same age and source (90th percentile)

Mentioned by

blogs
1 blog
twitter
1 X user
patent
1 patent

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
81 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Redundancy and Diversity in Security
Chapter number 26
Book title
Computer Security – ESORICS 2004
Published in
Lecture notes in computer science, September 2004
DOI 10.1007/978-3-540-30108-0_26
Book ISBNs
978-3-54-022987-2, 978-3-54-030108-0
Authors

Bev Littlewood, Lorenzo Strigini, Littlewood, Bev, Strigini, Lorenzo

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 81 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Brazil 2 2%
United States 2 2%
Italy 1 1%
United Kingdom 1 1%
Germany 1 1%
Unknown 74 91%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 25 31%
Student > Master 16 20%
Researcher 11 14%
Professor 4 5%
Student > Bachelor 3 4%
Other 12 15%
Unknown 10 12%
Readers by discipline Count As %
Computer Science 52 64%
Engineering 8 10%
Physics and Astronomy 3 4%
Social Sciences 2 2%
Agricultural and Biological Sciences 1 1%
Other 3 4%
Unknown 12 15%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 11. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 02 August 2021.
All research outputs
#2,843,352
of 23,036,991 outputs
Outputs from Lecture notes in computer science
#599
of 8,145 outputs
Outputs of similar age
#4,833
of 60,723 outputs
Outputs of similar age from Lecture notes in computer science
#3
of 31 outputs
Altmetric has tracked 23,036,991 research outputs across all sources so far. Compared to these this one has done well and is in the 87th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,145 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done particularly well, scoring higher than 92% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 60,723 tracked outputs that were published within six weeks on either side of this one in any source. This one has done particularly well, scoring higher than 92% of its contemporaries.
We're also able to compare this research output to 31 others from the same source and published within six weeks on either side of this one. This one has done particularly well, scoring higher than 90% of its contemporaries.