↓ Skip to main content

Security Protocols XXV

Overview of attention for book
Cover of 'Security Protocols XXV'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Multiple Objectives of Lawful-Surveillance Protocols
  3. Altmetric Badge
    Chapter 2 Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion)
  4. Altmetric Badge
    Chapter 3 Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System
  5. Altmetric Badge
    Chapter 4 Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion)
  6. Altmetric Badge
    Chapter 5 Assuring the Safety of Asymmetric Social Protocols
  7. Altmetric Badge
    Chapter 6 Assuring the Safety of Asymmetric Social Protocols (Transcript of Discussion)
  8. Altmetric Badge
    Chapter 7 Simulating Perceptions of Security
  9. Altmetric Badge
    Chapter 8 Simulating Perceptions of Security (Transcript of Discussion)
  10. Altmetric Badge
    Chapter 9 Self Attestation of Things
  11. Altmetric Badge
    Chapter 10 Self Attestation of Things (Transcript of Discussion)
  12. Altmetric Badge
    Chapter 11 Making Decryption Accountable
  13. Altmetric Badge
    Chapter 12 Making Decryption Accountable (Transcript of Discussion)
  14. Altmetric Badge
    Chapter 13 Extending Full Disk Encryption for the Future
  15. Altmetric Badge
    Chapter 14 Extending Full Disk Encryption for the Future (Transcript of Discussion)
  16. Altmetric Badge
    Chapter 15 Key Exchange with the Help of a Public Ledger
  17. Altmetric Badge
    Chapter 16 Key Exchange with the Help of a Public Ledger (Transcript of Discussion)
  18. Altmetric Badge
    Chapter 17 Reconciling Multiple Objectives – Politics or Markets?
  19. Altmetric Badge
    Chapter 18 Reconciling Multiple Objectives – Politics or Markets? (Transcript of Discussion)
  20. Altmetric Badge
    Chapter 19 The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations
  21. Altmetric Badge
    Chapter 20 The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations (Transcript of Discussion)
  22. Altmetric Badge
    Chapter 21 A Security Perspective on Publication Metrics
  23. Altmetric Badge
    Chapter 22 A Security Perspective on Publication Metrics (Transcript of Discussion)
  24. Altmetric Badge
    Chapter 23 Controlling Your Neighbour’s Bandwidth for Fun and for Profit
  25. Altmetric Badge
    Chapter 24 Controlling Your Neighbour’s Bandwidth for Fun and for Profit (Transcript of Discussion)
  26. Altmetric Badge
    Chapter 25 Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come
  27. Altmetric Badge
    Chapter 26 Permanent Reencryption: How to Survive Generations of Cryptanalysts to Come (Transcript of Discussion)
  28. Altmetric Badge
    Chapter 27 Security from Disjoint Paths: Is It Possible?
  29. Altmetric Badge
    Chapter 28 Security from Disjoint Paths: Is It Possible? (Transcript of Discussion)
  30. Altmetric Badge
    Chapter 29 End to End Security is Not Enough
  31. Altmetric Badge
    Chapter 30 End to End Security is Not Enough (Transcript of Discussion)
  32. Altmetric Badge
    Chapter 31 Auditable PAKEs: Approaching Fair Exchange Without a TTP
  33. Altmetric Badge
    Chapter 32 Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion)
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

policy
2 policy sources
twitter
1 X user
patent
1 patent

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security Protocols XXV
Published by
Springer, Cham, January 2017
DOI 10.1007/978-3-319-71075-4
ISBNs
978-3-31-971074-7, 978-3-31-971075-4
Editors

Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyáš

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 33%
Student > Bachelor 1 33%
Unknown 1 33%
Readers by discipline Count As %
Computer Science 1 33%
Engineering 1 33%
Unknown 1 33%