↓ Skip to main content

Security Protocols XVIII

Overview of attention for book
Cover of 'Security Protocols XVIII'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Introduction: Virtually Perfect Security (Transcript of Discussion)
  3. Altmetric Badge
    Chapter 2 Caught in the Maze of Security Standards
  4. Altmetric Badge
    Chapter 3 Caught in the Maze of Security Standards (Transcript of Discussion)
  5. Altmetric Badge
    Chapter 4 Blood in the Water
  6. Altmetric Badge
    Chapter 5 Blood in the Water (Transcript of Discussion)
  7. Altmetric Badge
    Chapter 6 Digital Immolation
  8. Altmetric Badge
    Chapter 7 Digital Immolation (Transcript of Discussion)
  9. Altmetric Badge
    Chapter 8 Relay-Proof Channels Using UWB Lasers
  10. Altmetric Badge
    Chapter 9 Relay-Proof Channels Using UWB Lasers (Transcript of Discussion)
  11. Altmetric Badge
    Chapter 10 Security Protocols XVIII
  12. Altmetric Badge
    Chapter 11 Using Dust Clouds to Enhance Anonymous Communication (Transcript of Discussion)
  13. Altmetric Badge
    Chapter 12 Generating Channel Ids in Virtual World Operating Systems (Extended Abstract)
  14. Altmetric Badge
    Chapter 13 Generating Channel Ids in Virtual World Operating Systems (Transcript of Discussion)
  15. Altmetric Badge
    Chapter 14 Censorship-Resilient Communications through Information Scattering
  16. Altmetric Badge
    Chapter 15 Censorship-Resilient Communications through Information Scattering (Transcript of Discussion)
  17. Altmetric Badge
    Chapter 16 On Storing Private Keys in the Cloud
  18. Altmetric Badge
    Chapter 17 On Storing Private Keys in the Cloud (Transcript of Discussion)
  19. Altmetric Badge
    Chapter 18 More Security or Less Insecurity
  20. Altmetric Badge
    Chapter 19 More Security or Less Insecurity (Transcript of Discussion)
  21. Altmetric Badge
    Chapter 20 It’s the Anthropology, Stupid!
  22. Altmetric Badge
    Chapter 21 It’s the Anthropology, Stupid! (Transcript of Discussion)
  23. Altmetric Badge
    Chapter 22 Security Design in Human Computation Games
  24. Altmetric Badge
    Chapter 23 Security Design in Human Computation Games (Transcript of Discussion)
  25. Altmetric Badge
    Chapter 24 Virtually Perfect Democracy
  26. Altmetric Badge
    Chapter 25 Virtually Perfect Democracy (Transcript of Discussion)
  27. Altmetric Badge
    Chapter 26 Security Protocols for Secret Santa
  28. Altmetric Badge
    Chapter 27 Security Protocols for Secret Santa (Transcript of Discussion)
  29. Altmetric Badge
    Chapter 28 Censorship of eBooks (Extended Abstract)
  30. Altmetric Badge
    Chapter 29 Censorship of eBooks (Transcript of Discussion)
  31. Altmetric Badge
    Chapter 30 On the Value of Hybrid Security Testing
  32. Altmetric Badge
    Chapter 31 On the Value of Hybrid Security Testing (Transcript of Discussion)
  33. Altmetric Badge
    Chapter 32 Security Made, Not Perfect, But Automatic
  34. Altmetric Badge
    Chapter 33 Security Made, Not Perfect, But Automatic (Transcript of Discussion)
  35. Altmetric Badge
    Chapter 34 Security Limitations of Virtualization and How to Overcome Them
  36. Altmetric Badge
    Chapter 35 Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion)
  37. Altmetric Badge
    Chapter 36 Recapitulation
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security Protocols XVIII
Published by
Springer Berlin Heidelberg, December 2014
DOI 10.1007/978-3-662-45921-8
ISBNs
978-3-66-245920-1, 978-3-66-245921-8
Editors

Christianson, Bruce, Malcolm, James

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 1 50%
Unknown 1 50%
Readers by discipline Count As %
Computer Science 1 50%
Unknown 1 50%