↓ Skip to main content

Security Protocols

Overview of attention for book
Cover of 'Security Protocols'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Putting the Human Back in the Protocol
  3. Altmetric Badge
    Chapter 2 Composing Security Metrics
  4. Altmetric Badge
    Chapter 3 Putting the Human Back in Voting Protocols
  5. Altmetric Badge
    Chapter 4 Putting the Human Back in Voting Protocols
  6. Altmetric Badge
    Chapter 5 Towards a Secure Application-Semantic Aware Policy Enforcement Architecture
  7. Altmetric Badge
    Chapter 6 Towards a Secure Application-Semantic Aware Policy Enforcement Architecture
  8. Altmetric Badge
    Chapter 7 Phish and Chips
  9. Altmetric Badge
    Chapter 8 Phish and Chips
  10. Altmetric Badge
    Chapter 9 Where Next for Formal Methods?
  11. Altmetric Badge
    Chapter 10 Security Protocols
  12. Altmetric Badge
    Chapter 11 Cordial Security Protocol Programming
  13. Altmetric Badge
    Chapter 12 Cordial Security Protocol Programming
  14. Altmetric Badge
    Chapter 13 Privacy-Sensitive Congestion Charging
  15. Altmetric Badge
    Chapter 14 Privacy-Sensitive Congestion Charging
  16. Altmetric Badge
    Chapter 15 The Value of Location Information
  17. Altmetric Badge
    Chapter 16 The Value of Location Information
  18. Altmetric Badge
    Chapter 17 Update on PIN or Signature
  19. Altmetric Badge
    Chapter 18 Innovations for Grid Security from Trusted Computing
  20. Altmetric Badge
    Chapter 19 Innovations for Grid Security from Trusted Computing
  21. Altmetric Badge
    Chapter 20 The Man-in-the-Middle Defence
  22. Altmetric Badge
    Chapter 21 Security Protocols
  23. Altmetric Badge
    Chapter 22 Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries
  24. Altmetric Badge
    Chapter 23 Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries
  25. Altmetric Badge
    Chapter 24 Secure Distributed Human Computation
  26. Altmetric Badge
    Chapter 25 Secure Distributed Human Computation
  27. Altmetric Badge
    Chapter 26 Bot, Cyborg and Automated Turing Test
  28. Altmetric Badge
    Chapter 27 Bot, Cyborg and Automated Turing Test
  29. Altmetric Badge
    Chapter 28 A 2-Round Anonymous Veto Protocol
  30. Altmetric Badge
    Chapter 29 A 2-Round Anonymous Veto Protocol
  31. Altmetric Badge
    Chapter 30 How to Speak an Authentication Secret Securely from an Eavesdropper
  32. Altmetric Badge
    Chapter 31 How to Speak an Authentication Secret Securely from an Eavesdropper
  33. Altmetric Badge
    Chapter 32 Secret Public Key Protocols Revisited
  34. Altmetric Badge
    Chapter 33 Secret Public Key Protocols Revisited
  35. Altmetric Badge
    Chapter 34 Vintage Bit Cryptography
  36. Altmetric Badge
    Chapter 35 Vintage Bit Cryptography
  37. Altmetric Badge
    Chapter 36 Usability of Security Management:Defining the Permissions of Guests
  38. Altmetric Badge
    Chapter 37 Usability of Security Management: Defining the Permissions of Guests
  39. Altmetric Badge
    Chapter 38 The Last Word
Attention for Chapter 17: Update on PIN or Signature
Altmetric Badge

Citations

dimensions_citation
1 Dimensions
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Update on PIN or Signature
Chapter number 17
Book title
Security Protocols
Published in
ADS, March 2006
DOI 10.1007/978-3-642-04904-0_17
Book ISBNs
978-3-64-204903-3, 978-3-64-204904-0
Authors

Vashek Matyas, Matyas, Vashek