↓ Skip to main content

Security Protocols

Overview of attention for book
Cover of 'Security Protocols'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Keynote Address: The Changing Environment
  3. Altmetric Badge
    Chapter 2 Composing Security Properties
  4. Altmetric Badge
    Chapter 3 Auditing against Multiple Policies
  5. Altmetric Badge
    Chapter 4 Jikzi: A New Framework for Secure Publishing
  6. Altmetric Badge
    Chapter 5 Jikzi: A New Framework for Secure Publishing
  7. Altmetric Badge
    Chapter 6 Power and Permission in Security Systems
  8. Altmetric Badge
    Chapter 7 Power and Permission in Computer Systems
  9. Altmetric Badge
    Chapter 8 Auditing against Impossible Abstractions
  10. Altmetric Badge
    Chapter 9 What is Authentication?
  11. Altmetric Badge
    Chapter 10 Security Protocols
  12. Altmetric Badge
    Chapter 11 The Yahalom Protocol
  13. Altmetric Badge
    Chapter 12 Modelling Agents’ Knowledge Inductively
  14. Altmetric Badge
    Chapter 13 Modelling Agents’ Knowledge Inductively
  15. Altmetric Badge
    Chapter 14 Time-Lock Puzzle with Examinable Evidence of Unlocking Time
  16. Altmetric Badge
    Chapter 15 Time-Lock Puzzle with Examinable Evidence of Unlocking Time
  17. Altmetric Badge
    Chapter 16 Trust Management and Network Layer Security Protocols
  18. Altmetric Badge
    Chapter 17 Trust Management and Network Layer Security Protocols
  19. Altmetric Badge
    Chapter 18 Issues in Multicast Security
  20. Altmetric Badge
    Chapter 19 Issues in Multicast Security
  21. Altmetric Badge
    Chapter 20 Performance of Protocols
  22. Altmetric Badge
    Chapter 21 Performance of Protocols
  23. Altmetric Badge
    Chapter 22 Integrity-Aware PCBC Encryption Schemes
  24. Altmetric Badge
    Chapter 23 Integrity-Aware PCBC Encryption Schemes
  25. Altmetric Badge
    Chapter 24 The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
  26. Altmetric Badge
    Chapter 25 The Resurrecting Duckling
  27. Altmetric Badge
    Chapter 26 INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds
  28. Altmetric Badge
    Chapter 27 INTERNET-MARKs
  29. Altmetric Badge
    Chapter 28 Pictures Can’t Lie under Oath
  30. Altmetric Badge
    Chapter 29 Pictures Can’t Lie under Oath
  31. Altmetric Badge
    Chapter 30 Bob versus Bob – Good Guy/Bad Guy
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

wikipedia
4 Wikipedia pages

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
146 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security Protocols
Published by
Springer, Berlin, Heidelberg, January 1999
DOI 10.1007/10720107
ISBNs
978-3-54-067381-1, 978-3-54-045570-7
Editors

Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 146 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 7 5%
Spain 4 3%
Germany 3 2%
United States 2 1%
Portugal 1 <1%
Switzerland 1 <1%
India 1 <1%
Turkey 1 <1%
Pakistan 1 <1%
Other 1 <1%
Unknown 124 85%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 53 36%
Student > Master 23 16%
Researcher 16 11%
Professor > Associate Professor 14 10%
Student > Doctoral Student 12 8%
Other 24 16%
Unknown 4 3%
Readers by discipline Count As %
Computer Science 115 79%
Engineering 15 10%
Unspecified 5 3%
Medicine and Dentistry 2 1%
Business, Management and Accounting 1 <1%
Other 4 3%
Unknown 4 3%