↓ Skip to main content

Computer Security – ESORICS 2015

Overview of attention for book
Cover of 'Computer Security – ESORICS 2015'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Towards Security of Internet Naming Infrastructure
  3. Altmetric Badge
    Chapter 2 Waiting for CSP – Securing Legacy Web Applications with JSAgents
  4. Altmetric Badge
    Chapter 3 Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the Web
  5. Altmetric Badge
    Chapter 4 A Practical Approach for Adaptive Data Structure Layout Randomization
  6. Altmetric Badge
    Chapter 5 Trustworthy Prevention of Code Injection in Linux on Embedded Devices
  7. Altmetric Badge
    Chapter 6 Practical Memory Deduplication Attacks in Sandboxed Javascript
  8. Altmetric Badge
    Chapter 7 Computational Soundness for Interactive Primitives
  9. Altmetric Badge
    Chapter 8 Verifiably Encrypted Signatures: Security Revisited and a New Construction
  10. Altmetric Badge
    Chapter 9 Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform Distributions
  11. Altmetric Badge
    Chapter 10 Efficient Message Authentication Codes with Combinatorial Group Testing
  12. Altmetric Badge
    Chapter 11 Symmetric-Key Based Proofs of Retrievability Supporting Public Verification
  13. Altmetric Badge
    Chapter 12 DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead
  14. Altmetric Badge
    Chapter 13 Short Accountable Ring Signatures Based on DDH
  15. Altmetric Badge
    Chapter 14 Updatable Hash Proof System and Its Applications
  16. Altmetric Badge
    Chapter 15 Server-Aided Revocable Identity-Based Encryption
  17. Altmetric Badge
    Chapter 16 Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
  18. Altmetric Badge
    Chapter 17 Making Any Identity-Based Encryption Accountable, Efficiently
  19. Altmetric Badge
    Chapter 18 Practical Threshold Password-Authenticated Secret Sharing Protocol
  20. Altmetric Badge
    Chapter 19 On Security of Content-Based Video Stream Authentication
  21. Altmetric Badge
    Chapter 20 Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification
  22. Altmetric Badge
    Chapter 21 Practical Invalid Curve Attacks on TLS-ECDH
  23. Altmetric Badge
    Chapter 22 Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?
  24. Altmetric Badge
    Chapter 23 Transforming Out Timing Leaks, More or Less
  25. Altmetric Badge
    Chapter 24 Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
  26. Altmetric Badge
    Chapter 25 Should Cyber-Insurance Providers Invest in Software Security?
  27. Altmetric Badge
    Chapter 26 Lightweight and Flexible Trust Assessment Modules for the Internet of Things
  28. Altmetric Badge
    Chapter 27 Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks
Attention for Chapter 27: Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks
Altmetric Badge

Mentioned by

wikipedia
4 Wikipedia pages

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
27 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief Networks
Chapter number 27
Book title
Computer Security -- ESORICS 2015
Published by
Springer, Cham, September 2015
DOI 10.1007/978-3-319-24174-6_27
Book ISBNs
978-3-31-924173-9, 978-3-31-924174-6
Authors

Paul Beaumont, Neil Evans, Michael Huth, Tom Plant, Beaumont, Paul, Evans, Neil, Huth, Michael, Plant, Tom

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 27 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 27 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 9 33%
Researcher 3 11%
Professor 2 7%
Other 2 7%
Student > Master 2 7%
Other 4 15%
Unknown 5 19%
Readers by discipline Count As %
Computer Science 14 52%
Engineering 4 15%
Neuroscience 1 4%
Physics and Astronomy 1 4%
Unknown 7 26%