↓ Skip to main content

Computer Security – ESORICS 2017

Overview of attention for book
Cover of 'Computer Security – ESORICS 2017'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches
  3. Altmetric Badge
    Chapter 2 Quantifying Web Adblocker Privacy
  4. Altmetric Badge
    Chapter 3 More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds
  5. Altmetric Badge
    Chapter 4 Adversarial Examples for Malware Detection
  6. Altmetric Badge
    Chapter 5 PerfWeb: How to Violate Web Privacy with Hardware Performance Events
  7. Altmetric Badge
    Chapter 6 Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise (‘DiskFiltration’)
  8. Altmetric Badge
    Chapter 7 DOMPurify: Client-Side Protection Against XSS and Markup Injection
  9. Altmetric Badge
    Chapter 8 Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN
  10. Altmetric Badge
    Chapter 9 A Traceability Analysis of Monero’s Blockchain
  11. Altmetric Badge
    Chapter 10 Multi-rate Threshold FlipThem
  12. Altmetric Badge
    Chapter 11 Practical Keystroke Timing Attacks in Sandboxed JavaScript
  13. Altmetric Badge
    Chapter 12 On-Demand Time Blurring to Support Side-Channel Defense
  14. Altmetric Badge
    Chapter 13 VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples
  15. Altmetric Badge
    Chapter 14 Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios
  16. Altmetric Badge
    Chapter 15 LeaPS: Learning-Based Proactive Security Auditing for Clouds
  17. Altmetric Badge
    Chapter 16 Identifying Multiple Authors in a Binary Program
  18. Altmetric Badge
    Chapter 17 Secure IDS Offloading with Nested Virtualization and Deep VM Introspection
  19. Altmetric Badge
    Chapter 18 Privacy Implications of Room Climate Data
  20. Altmetric Badge
    Chapter 19 Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder
  21. Altmetric Badge
    Chapter 20 No Sugar but All the Taste! Memory Encryption Without Architectural Support
  22. Altmetric Badge
    Chapter 21 Inference-Proof Updating of a Weakened View Under the Modification of Input Parameters
  23. Altmetric Badge
    Chapter 22 Preventing Advanced Persistent Threats in Complex Control Networks
  24. Altmetric Badge
    Chapter 23 Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios
  25. Altmetric Badge
    Chapter 24 Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors
  26. Altmetric Badge
    Chapter 25 RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
  27. Altmetric Badge
    Chapter 26 SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision
  28. Altmetric Badge
    Chapter 27 Privacy-Preserving Decision Trees Evaluation via Linear Functions
  29. Altmetric Badge
    Chapter 28 Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality
  30. Altmetric Badge
    Chapter 29 Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
  31. Altmetric Badge
    Chapter 30 Enforcing Input Correctness via Certification in Garbled Circuit Evaluation
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
13 X users
patent
2 patents
wikipedia
3 Wikipedia pages

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
73 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computer Security – ESORICS 2017
Published by
Springer, Cham, January 2017
DOI 10.1007/978-3-319-66399-9
ISBNs
978-3-31-966398-2, 978-3-31-966399-9
Editors

Simon N. Foley, Dieter Gollmann, Einar Snekkenes

X Demographics

X Demographics

The data shown below were collected from the profiles of 13 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 73 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 73 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 20 27%
Student > Ph. D. Student 11 15%
Researcher 7 10%
Student > Doctoral Student 5 7%
Student > Bachelor 4 5%
Other 9 12%
Unknown 17 23%
Readers by discipline Count As %
Computer Science 44 60%
Engineering 4 5%
Business, Management and Accounting 2 3%
Unspecified 1 1%
Physics and Astronomy 1 1%
Other 3 4%
Unknown 18 25%