↓ Skip to main content

Computer Security – ESORICS 2012

Overview of attention for book
Cover of 'Computer Security – ESORICS 2012'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Modeling and Enhancing Android’s Permission System
  3. Altmetric Badge
    Chapter 2 Hardening Access Control and Data Protection in GFS-like File Systems
  4. Altmetric Badge
    Chapter 3 Attack of the Clones: Detecting Cloned Applications on Android Markets
  5. Altmetric Badge
    Chapter 4 Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing
  6. Altmetric Badge
    Chapter 5 Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions
  7. Altmetric Badge
    Chapter 6 Deciding Epistemic and Strategic Properties of Cryptographic Protocols
  8. Altmetric Badge
    Chapter 7 Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model
  9. Altmetric Badge
    Chapter 8 Deciding Security for a Fragment of ASLan
  10. Altmetric Badge
    Chapter 9 A Probabilistic Framework for Localization of Attackers in MANETs
  11. Altmetric Badge
    Chapter 10 Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN
  12. Altmetric Badge
    Chapter 11 Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks
  13. Altmetric Badge
    Chapter 12 Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties
  14. Altmetric Badge
    Chapter 13 X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
  15. Altmetric Badge
    Chapter 14 A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols
  16. Altmetric Badge
    Chapter 15 The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs
  17. Altmetric Badge
    Chapter 16 Security of Patched DNS
  18. Altmetric Badge
    Chapter 17 Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach
  19. Altmetric Badge
    Chapter 18 Exploring Linkability of User Reviews
  20. Altmetric Badge
    Chapter 19 Formal Analysis of Privacy in an eHealth Protocol
  21. Altmetric Badge
    Chapter 20 PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters
  22. Altmetric Badge
    Chapter 21 SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags
  23. Altmetric Badge
    Chapter 22 Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data
  24. Altmetric Badge
    Chapter 23 Enhancing Location Privacy for Electric Vehicles (at the Right time)
  25. Altmetric Badge
    Chapter 24 Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System
  26. Altmetric Badge
    Chapter 25 Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System
  27. Altmetric Badge
    Chapter 26 Defining Privacy for Weighted Votes, Single and Multi-voter Coercion
  28. Altmetric Badge
    Chapter 27 TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks
  29. Altmetric Badge
    Chapter 28 Introducing the gMix Open Source Framework for Mix Implementations
  30. Altmetric Badge
    Chapter 29 Secure and Efficient Outsourcing of Sequence Comparisons
  31. Altmetric Badge
    Chapter 30 Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
  32. Altmetric Badge
    Chapter 31 New Algorithms for Secure Outsourcing of Modular Exponentiations
  33. Altmetric Badge
    Chapter 32 Towards Symbolic Encryption Schemes
  34. Altmetric Badge
    Chapter 33 Decision Procedures for Simulatability
  35. Altmetric Badge
    Chapter 34 Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems
  36. Altmetric Badge
    Chapter 35 Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext
  37. Altmetric Badge
    Chapter 36 Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience
  38. Altmetric Badge
    Chapter 37 Unique Group Signatures
  39. Altmetric Badge
    Chapter 38 Relations among Notions of Privacy for RFID Authentication Protocols
  40. Altmetric Badge
    Chapter 39 PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation
  41. Altmetric Badge
    Chapter 40 Dismantling iClass and iClass Elite
  42. Altmetric Badge
    Chapter 41 Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms
  43. Altmetric Badge
    Chapter 42 Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
  44. Altmetric Badge
    Chapter 43 Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption
  45. Altmetric Badge
    Chapter 44 On the Security of Password Manager Database Formats
  46. Altmetric Badge
    Chapter 45 Scalable Telemetry Classification for Automated Malware Detection
  47. Altmetric Badge
    Chapter 46 Abstraction-Based Malware Analysis Using Rewriting and Model Checking
  48. Altmetric Badge
    Chapter 47 Detecting Phishing Emails the Natural Language Way
  49. Altmetric Badge
    Chapter 48 JVM-Portable Sandboxing of Java’s Native Libraries
  50. Altmetric Badge
    Chapter 49 Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions
  51. Altmetric Badge
    Chapter 50 SocialImpact: Systematic Analysis of Underground Social Dynamics
Attention for Chapter 44: On the Security of Password Manager Database Formats
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • Good Attention Score compared to outputs of the same age (79th percentile)
  • High Attention Score compared to outputs of the same age and source (84th percentile)

Mentioned by

twitter
1 tweeter
wikipedia
1 Wikipedia page
q&a
1 Q&A thread

Citations

dimensions_citation
8 Dimensions

Readers on

mendeley
98 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
On the Security of Password Manager Database Formats
Chapter number 44
Book title
Computer Security – ESORICS 2012
Published in
Lecture notes in computer science, September 2012
DOI 10.1007/978-3-642-33167-1_44
Book ISBNs
978-3-64-233166-4, 978-3-64-233167-1
Authors

Paolo Gasti, Kasper B. Rasmussen, Gasti, Paolo, Rasmussen, Kasper B.

Twitter Demographics

The data shown below were collected from the profile of 1 tweeter who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 98 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 2 2%
United States 2 2%
Denmark 1 1%
Unknown 93 95%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 22 22%
Student > Master 19 19%
Student > Ph. D. Student 14 14%
Researcher 6 6%
Student > Postgraduate 5 5%
Other 14 14%
Unknown 18 18%
Readers by discipline Count As %
Computer Science 65 66%
Engineering 6 6%
Business, Management and Accounting 2 2%
Mathematics 2 2%
Agricultural and Biological Sciences 1 1%
Other 4 4%
Unknown 18 18%

Attention Score in Context

This research output has an Altmetric Attention Score of 7. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 31 March 2021.
All research outputs
#4,020,893
of 20,618,952 outputs
Outputs from Lecture notes in computer science
#1,427
of 8,009 outputs
Outputs of similar age
#40,656
of 204,631 outputs
Outputs of similar age from Lecture notes in computer science
#25
of 156 outputs
Altmetric has tracked 20,618,952 research outputs across all sources so far. Compared to these this one has done well and is in the 80th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,009 research outputs from this source. They receive a mean Attention Score of 4.8. This one has done well, scoring higher than 81% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 204,631 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 79% of its contemporaries.
We're also able to compare this research output to 156 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 84% of its contemporaries.