↓ Skip to main content

Security Protocols

Overview of attention for book
Cover of 'Security Protocols'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 The System Likes You
  3. Altmetric Badge
    Chapter 2 Experiences with Host-to-Host IPsec
  4. Altmetric Badge
    Chapter 3 Experiences with Host-to-Host IPsec
  5. Altmetric Badge
    Chapter 4 Repairing the Bluetooth Pairing Protocol
  6. Altmetric Badge
    Chapter 5 Repairing the Bluetooth Pairing Protocol
  7. Altmetric Badge
    Chapter 6 Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags
  8. Altmetric Badge
    Chapter 7 Keep on Blockin’ in the Free World
  9. Altmetric Badge
    Chapter 8 PIN (and Chip) or Signature: Beating the Cheating?
  10. Altmetric Badge
    Chapter 9 PIN (and Chip) or Signature: Beating the Cheating?
  11. Altmetric Badge
    Chapter 10 Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)
  12. Altmetric Badge
    Chapter 11 Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable)
  13. Altmetric Badge
    Chapter 12 Authorisation Subterfuge by Delegation in Decentralised Networks
  14. Altmetric Badge
    Chapter 13 Authorisation Subterfuge by Delegation in Decentralised Networks
  15. Altmetric Badge
    Chapter 14 Multi-channel Protocols
  16. Altmetric Badge
    Chapter 15 Multi-channel Protocols
  17. Altmetric Badge
    Chapter 16 Combining Crypto with Biometrics: A New Human-Security Interface
  18. Altmetric Badge
    Chapter 17 User-Friendly Grid Security Architecture and Protocols
  19. Altmetric Badge
    Chapter 18 User-Friendly Grid Security Architecture and Protocols
  20. Altmetric Badge
    Chapter 19 Countering Automated Exploits with System Security CAPTCHAS
  21. Altmetric Badge
    Chapter 20 Countering Automated Exploits with System Security CAPTCHAS
  22. Altmetric Badge
    Chapter 21 The System Likes You?
  23. Altmetric Badge
    Chapter 22 Enhancing Privacy with Shared Pseudo Random Sequences
  24. Altmetric Badge
    Chapter 23 Enhancing Privacy with Shared Pseudo Random Sequences
  25. Altmetric Badge
    Chapter 24 Non-repudiation and the Metaphysics of Presence
  26. Altmetric Badge
    Chapter 25 Non-repudiation and the Metaphysics of Presence
  27. Altmetric Badge
    Chapter 26 Understanding Why Some Network Protocols Are User-Unfriendly
  28. Altmetric Badge
    Chapter 27 Understanding Why Some Network Protocols Are User-Unfriendly
  29. Altmetric Badge
    Chapter 28 Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer
  30. Altmetric Badge
    Chapter 29 Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer
  31. Altmetric Badge
    Chapter 30 Listen Too Closely and You May Be Confused
  32. Altmetric Badge
    Chapter 31 Listen Too Closely and You May Be Confused
  33. Altmetric Badge
    Chapter 32 The Dining Freemasons (Security Protocols for Secret Societies)
  34. Altmetric Badge
    Chapter 33 The Dining Freemasons (Security Protocols for Secret Societies)
  35. Altmetric Badge
    Chapter 34 On the Evolution of Adversary Models in Security Protocols (or Know Your Friend and Foe Alike)
  36. Altmetric Badge
    Chapter 35 Safer Scripting Through Precompilation
  37. Altmetric Badge
    Chapter 36 Safer Scripting Through Precompilation
  38. Altmetric Badge
    Chapter 37 Implementing a Multi-hat PDA
  39. Altmetric Badge
    Chapter 38 Implementing a Multi-hat PDA
  40. Altmetric Badge
    Chapter 39 Anonymous Context Based Role Activation Mechanism
  41. Altmetric Badge
    Chapter 40 Anonymous Context Based Role Activation Mechanism
  42. Altmetric Badge
    Chapter 41 Topology of Covert Conflict
  43. Altmetric Badge
    Chapter 42 Security Protocols
  44. Altmetric Badge
    Chapter 43 Security Protocols
  45. Altmetric Badge
    Chapter 44 Alice and Bob
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
14 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security Protocols
Published by
Springer Berlin Heidelberg, November 2007
DOI 10.1007/978-3-540-77156-2
ISBNs
978-3-54-077155-5, 978-3-54-077156-2
Editors

Christianson, Bruce, Crispo, Bruno, Malcolm, James A., Roe, Michael

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 14 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
South Africa 1 7%
Unknown 13 93%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 3 21%
Student > Postgraduate 2 14%
Student > Master 2 14%
Student > Ph. D. Student 2 14%
Other 1 7%
Other 1 7%
Unknown 3 21%
Readers by discipline Count As %
Computer Science 7 50%
Engineering 3 21%
Social Sciences 1 7%
Unknown 3 21%