↓ Skip to main content

Security Protocols

Overview of attention for book
Cover of 'Security Protocols'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Introduction (Transcript)
  3. Altmetric Badge
    Chapter 2 Keynote Address
  4. Altmetric Badge
    Chapter 3 Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties
  5. Altmetric Badge
    Chapter 4 Is Entity Authentication Necessary?
  6. Altmetric Badge
    Chapter 5 A Structured Operational Modelling of the Dolev-Yao Threat Model
  7. Altmetric Badge
    Chapter 6 On Trust Establishment in Mobile Ad-Hoc Networks
  8. Altmetric Badge
    Chapter 7 Legally Authorized and Unauthorized Digital Evidence
  9. Altmetric Badge
    Chapter 8 Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing
  10. Altmetric Badge
    Chapter 9 Contractual Access Control
  11. Altmetric Badge
    Chapter 10 Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks
  12. Altmetric Badge
    Chapter 11 Security Protocols
  13. Altmetric Badge
    Chapter 12 Combinatorial Optimization of Countermeasures against Illegal Copying
  14. Altmetric Badge
    Chapter 13 Protocols with Certified-Transfer Servers
  15. Altmetric Badge
    Chapter 14 An Architecture for an Adaptive Intrusion-Tolerant Server
  16. Altmetric Badge
    Chapter 15 Supporting Imprecise Delegation in KeyNote
  17. Altmetric Badge
    Chapter 16 Modeling Protocols for Secure Group Communications in Ad Hoc Networks
  18. Altmetric Badge
    Chapter 17 Delegation of Signalling Rights
  19. Altmetric Badge
    Chapter 18 Mobile IPv6 Security
  20. Altmetric Badge
    Chapter 19 Concluding Discussion: Accounting for Resources
  21. Altmetric Badge
    Chapter 20 Back to the Beginning
Attention for Chapter 3: Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
8 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties
Chapter number 3
Book title
Security Protocols
Published by
Springer, Berlin, Heidelberg, April 2002
DOI 10.1007/978-3-540-39871-4_3
Book ISBNs
978-3-54-020830-3, 978-3-54-039871-4
Authors

Jari Arkko, Pekka Nikander, Arkko, Jari, Nikander, Pekka

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 8 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Portugal 1 13%
Unknown 7 88%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 38%
Student > Master 2 25%
Student > Bachelor 1 13%
Other 1 13%
Researcher 1 13%
Other 0 0%
Readers by discipline Count As %
Computer Science 8 100%