↓ Skip to main content

Information Security Technology for Applications

Overview of attention for book
Cover of 'Information Security Technology for Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 BloomCasting: Security in Bloom Filter Based Multicast
  3. Altmetric Badge
    Chapter 2 Authentication Session Migration
  4. Altmetric Badge
    Chapter 3 Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles
  5. Altmetric Badge
    Chapter 4 Experimental Analysis of the Femtocell Location Verification Techniques
  6. Altmetric Badge
    Chapter 5 “Why Wasn’t I Notified?”: Information Security Incident Reporting Demystified
  7. Altmetric Badge
    Chapter 6 Use of Ratings from Personalized Communities for Trustworthy Application Installation
  8. Altmetric Badge
    Chapter 7 Practical Private Information Aggregation in Large Networks
  9. Altmetric Badge
    Chapter 8 Tracking Malicious Hosts on a 10Gbps Backbone Link
  10. Altmetric Badge
    Chapter 9 Service Users’ Requirements for Tools to Support Effective On-line Privacy and Consent Practices
  11. Altmetric Badge
    Chapter 10 Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions
  12. Altmetric Badge
    Chapter 11 A Framework for the Modular Specification and Orchestration of Authorization Policies
  13. Altmetric Badge
    Chapter 12 Credential Disabling from Trusted Execution Environments
  14. Altmetric Badge
    Chapter 13 Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications
  15. Altmetric Badge
    Chapter 14 Implementing Erasure Policies Using Taint Analysis
  16. Altmetric Badge
    Chapter 15 A Taint Mode for Python via a Library
  17. Altmetric Badge
    Chapter 16 Security of Web Mashups: A Survey
  18. Altmetric Badge
    Chapter 17 Safe Wrappers and Sane Policies for Self Protecting JavaScript
  19. Altmetric Badge
    Chapter 18 Protocol Implementation Generator
  20. Altmetric Badge
    Chapter 19 Secure and Fast Implementations of Two Involution Ciphers
  21. Altmetric Badge
    Chapter 20 The PASSERINE Public Key Encryption and Authentication Mechanism
Attention for Chapter 18: Protocol Implementation Generator
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
5 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Protocol Implementation Generator
Chapter number 18
Book title
Information Security Technology for Applications
Published by
Springer, Berlin, Heidelberg, October 2010
DOI 10.1007/978-3-642-27937-9_18
Book ISBNs
978-3-64-227936-2, 978-3-64-227937-9
Authors

Jose Quaresma, Christian W. Probst, Quaresma, Jose, Probst, Christian W.

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 5 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Denmark 1 20%
Unknown 4 80%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 40%
Student > Postgraduate 1 20%
Other 1 20%
Unknown 1 20%
Readers by discipline Count As %
Computer Science 3 60%
Engineering 1 20%
Unknown 1 20%