↓ Skip to main content

Security Protocols XVI

Overview of attention for book
Cover of 'Security Protocols XVI'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Remodelling the Attacker (Transcript of Discussion)
  3. Altmetric Badge
    Chapter 2 Fighting the ‘Good’ Internet War
  4. Altmetric Badge
    Chapter 3 Security Protocol Deployment Risk
  5. Altmetric Badge
    Chapter 4 Security Protocol Deployment Risk (Transcript of Discussion)
  6. Altmetric Badge
    Chapter 5 Do Not Model the Attacker
  7. Altmetric Badge
    Chapter 6 Do Not Model the Attacker (Transcript of Discussion)
  8. Altmetric Badge
    Chapter 7 Generating Random Numbers in Hostile Environments
  9. Altmetric Badge
    Chapter 8 Generating Random Numbers in Hostile Environments (Transcript of Discussion)
  10. Altmetric Badge
    Chapter 9 Security Protocols XVI
  11. Altmetric Badge
    Chapter 10 Security Protocols XVI
  12. Altmetric Badge
    Chapter 11 Problems with Same Origin Policy
  13. Altmetric Badge
    Chapter 12 Problems with Same Origin Policy (Transcript of Discussion)
  14. Altmetric Badge
    Chapter 13 Security Protocols XVI
  15. Altmetric Badge
    Chapter 14 Security Protocols XVI
  16. Altmetric Badge
    Chapter 15 TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing
  17. Altmetric Badge
    Chapter 16 TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion)
  18. Altmetric Badge
    Chapter 17 Handling New Adversaries in Wireless Ad-Hoc Networks
  19. Altmetric Badge
    Chapter 18 Handling New Adversaries in Wireless Ad-Hoc Networks (Transcript of Discussion)
  20. Altmetric Badge
    Chapter 19 Problems of Provenance for Digital Libraries
  21. Altmetric Badge
    Chapter 20 Problems of Provenance for Digital Libraries (Transcript of Discussion)
  22. Altmetric Badge
    Chapter 21 Towards Understanding Pure Publish/Subscribe Cryptographic Protocols
  23. Altmetric Badge
    Chapter 22 Towards Understanding Pure Publish/Subscribe Cryptographic Protocols (Transcript of Discussion)
  24. Altmetric Badge
    Chapter 23 Password Authenticated Key Exchange by Juggling
  25. Altmetric Badge
    Chapter 24 Password Authenticated Key Exchange by Juggling (Transcript of Discussion)
  26. Altmetric Badge
    Chapter 25 A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates)
  27. Altmetric Badge
    Chapter 26 A Real World Application of Secure Multi-party Computations (Transcript of Discussion)
  28. Altmetric Badge
    Chapter 27 Covert Communications Despite Traffic Data Retention
  29. Altmetric Badge
    Chapter 28 Covert Communications Despite Traffic Data Retention (Transcript of Discussion)
  30. Altmetric Badge
    Chapter 29 Security Protocols XVI
  31. Altmetric Badge
    Chapter 30 Security Protocols XVI
  32. Altmetric Badge
    Chapter 31 Remodelling the Attacker in Voting Protocols
  33. Altmetric Badge
    Chapter 32 Remodelling the Attacker in Voting Protocols (Transcript of Discussion)
  34. Altmetric Badge
    Chapter 33 Bridging the Gap between Vulnerabilities and Threats in Electronic Voting
  35. Altmetric Badge
    Chapter 34 Bridging the Gap between Vulnerabilities and Threats in Electronic Voting (Transcript of Discussion)
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent
wikipedia
1 Wikipedia page

Readers on

mendeley
9 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security Protocols XVI
Published by
Springer Berlin Heidelberg, July 2011
DOI 10.1007/978-3-642-22137-8
ISBNs
978-3-64-222136-1, 978-3-64-222137-8
Editors

Christianson, Bruce, Malcolm, James A., Matyas, Vashek, Roe, Michael