↓ Skip to main content

Computer Security – ESORICS 2011

Overview of attention for book
Cover of 'Computer Security – ESORICS 2011'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Secure Localization Using Dynamic Verifiers
  3. Altmetric Badge
    Chapter 2 WiFiHop - Mitigating the Evil Twin Attack through Multi-hop Detection
  4. Altmetric Badge
    Chapter 3 Investigation of Signal and Message Manipulations on the Wireless Channel
  5. Altmetric Badge
    Chapter 4 Protecting Private Web Content from Embedded Scripts
  6. Altmetric Badge
    Chapter 5 Preventing Web Application Injections with Complementary Character Coding
  7. Altmetric Badge
    Chapter 6 Automatic and Precise Client-Side Protection against CSRF Attacks
  8. Altmetric Badge
    Chapter 7 Timing Is Everything: The Importance of History Detection
  9. Altmetric Badge
    Chapter 8 Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs
  10. Altmetric Badge
    Chapter 9 A Systematic Analysis of XSS Sanitization in Web Application Frameworks
  11. Altmetric Badge
    Chapter 10 Who Wrote This Code? Identifying the Authors of Program Binaries
  12. Altmetric Badge
    Chapter 11 Secure and Efficient Protocols for Iris and Fingerprint Identification
  13. Altmetric Badge
    Chapter 12 Linear Obfuscation to Combat Symbolic Execution
  14. Altmetric Badge
    Chapter 13 DriverGuard: A Fine-Grained Protection on I/O Flows
  15. Altmetric Badge
    Chapter 14 Time-Storage Trade-Offs for Cryptographically-Enforced Access Control
  16. Altmetric Badge
    Chapter 15 Socially Constructed Trust for Distributed Authorization
  17. Altmetric Badge
    Chapter 16 Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles
  18. Altmetric Badge
    Chapter 17 How to Aggregate the CL Signature Scheme
  19. Altmetric Badge
    Chapter 18 Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2
  20. Altmetric Badge
    Chapter 19 Adapting Helios for Provable Ballot Privacy
  21. Altmetric Badge
    Chapter 20 Remote Timing Attacks Are Still Practical
  22. Altmetric Badge
    Chapter 21 Multi-run Security
  23. Altmetric Badge
    Chapter 22 Automated Information Flow Analysis of Virtualized Infrastructures
  24. Altmetric Badge
    Chapter 23 Scalable Analysis of Attack Scenarios
  25. Altmetric Badge
    Chapter 24 Usability of Display-Equipped RFID Tags for Security Purposes
  26. Altmetric Badge
    Chapter 25 Forcing Johnny to Login Safely
  27. Altmetric Badge
    Chapter 26 Towards a Mechanism for Incentivating Privacy
  28. Altmetric Badge
    Chapter 27 Investigating the OpenPGP Web of Trust
  29. Altmetric Badge
    Chapter 28 A Practical Complexity-Theoretic Analysis of Mix Systems
  30. Altmetric Badge
    Chapter 29 A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds
  31. Altmetric Badge
    Chapter 30 Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective
  32. Altmetric Badge
    Chapter 31 A New RFID Privacy Model
  33. Altmetric Badge
    Chapter 32 Quantitative Information Flow, with a View
  34. Altmetric Badge
    Chapter 33 To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data
  35. Altmetric Badge
    Chapter 34 Don’t Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing
  36. Altmetric Badge
    Chapter 35 Supporting Concurrency in Private Data Outsourcing
  37. Altmetric Badge
    Chapter 36 Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods
Attention for Chapter 3: Investigation of Signal and Message Manipulations on the Wireless Channel
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
51 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Investigation of Signal and Message Manipulations on the Wireless Channel
Chapter number 3
Book title
Computer Security – ESORICS 2011
Published by
Springer, Berlin, Heidelberg, September 2011
DOI 10.1007/978-3-642-23822-2_3
Book ISBNs
978-3-64-223821-5, 978-3-64-223822-2
Authors

Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun, Pöpper, Christina, Tippenhauer, Nils Ole, Danev, Boris, Capkun, Srdjan

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 51 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 2 4%
Germany 2 4%
Unknown 47 92%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 21 41%
Student > Master 7 14%
Researcher 6 12%
Student > Bachelor 4 8%
Lecturer 1 2%
Other 4 8%
Unknown 8 16%
Readers by discipline Count As %
Computer Science 33 65%
Engineering 7 14%
Physics and Astronomy 1 2%
Unspecified 1 2%
Unknown 9 18%