↓ Skip to main content

Security Protocols

Overview of attention for book
Cover of 'Security Protocols'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Keynote Address: Security Protocols and the Swiss Army Knife
  3. Altmetric Badge
    Chapter 2 Mergers and Principals
  4. Altmetric Badge
    Chapter 3 Mergers and Principals
  5. Altmetric Badge
    Chapter 4 Authentication and Naming
  6. Altmetric Badge
    Chapter 5 Users and Trust in Cyberspace
  7. Altmetric Badge
    Chapter 6 Users and Trust in Cyberspace
  8. Altmetric Badge
    Chapter 7 Interactive Identification Protocols
  9. Altmetric Badge
    Chapter 8 Open Questions
  10. Altmetric Badge
    Chapter 9 Looking on the Bright Side of Black-Box Cryptography
  11. Altmetric Badge
    Chapter 10 Security Protocols
  12. Altmetric Badge
    Chapter 11 Security Protocols
  13. Altmetric Badge
    Chapter 12 Making Sense of Specifications: The Formalization of SET
  14. Altmetric Badge
    Chapter 13 Lack of Explicitness Strikes Back
  15. Altmetric Badge
    Chapter 14 Lack of Explicitness Strikes Back
  16. Altmetric Badge
    Chapter 15 Review and Revocation of Access Privileges Distributed with PKI Certificates
  17. Altmetric Badge
    Chapter 16 Review and Revocation of Access Privileges Distributed with PKI Certificates
  18. Altmetric Badge
    Chapter 17 The Correctness of Crypto Transaction Sets
  19. Altmetric Badge
    Chapter 18 The Correctness of Crypto Transaction Sets
  20. Altmetric Badge
    Chapter 19 Micro-management of Risk in a Trust-Based Billing System
  21. Altmetric Badge
    Chapter 20 Broadening the Scope of Fault Tolerance within Secure Services
  22. Altmetric Badge
    Chapter 21 Broadening the Scope of Fault Tolerance within Secure Services
  23. Altmetric Badge
    Chapter 22 DOS-Resistant Authentication with Client Puzzles
  24. Altmetric Badge
    Chapter 23 DOS-Resistant Authentication with Client Puzzles
  25. Altmetric Badge
    Chapter 24 Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms
  26. Altmetric Badge
    Chapter 25 Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms
  27. Altmetric Badge
    Chapter 26 Denial of Service — Panel Discussion
  28. Altmetric Badge
    Chapter 27 The Resurrecting Duckling — What Next?
  29. Altmetric Badge
    Chapter 28 The Resurrecting Duckling — What Next?
  30. Altmetric Badge
    Chapter 29 An Anonymous Auction Protocol Using “Money Escrow”
  31. Altmetric Badge
    Chapter 30 Short Certification of Secure RSA Modulus
  32. Altmetric Badge
    Chapter 31 Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis —
  33. Altmetric Badge
    Chapter 32 Authentication Web-Based Virtual Shops Using Signature-Embedded Marks — A Practical Analysis —
  34. Altmetric Badge
    Chapter 33 I Cannot Tell a Lie
  35. Altmetric Badge
    Chapter 34 Afterward
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
11 X users
peer_reviews
1 peer review site

Citations

dimensions_citation
1 Dimensions
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security Protocols
Published by
Springer Science & Business Media, September 2001
DOI 10.1007/3-540-44810-1
ISBNs
978-3-54-042566-3, 978-3-54-044810-5
Editors

Christianson, Bruce, Malcolm, James A., Crispo, Bruno, Roe, Michael

X Demographics

X Demographics

The data shown below were collected from the profiles of 11 X users who shared this research output. Click here to find out more about how the information was compiled.