↓ Skip to main content

Computer Security -- ESORICS 2015

Overview of attention for book
Cover of 'Computer Security -- ESORICS 2015'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting
  3. Altmetric Badge
    Chapter 2 Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections
  4. Altmetric Badge
    Chapter 3 Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted Records
  5. Altmetric Badge
    Chapter 4 Privacy-Preserving Link Prediction in Decentralized Online Social Networks
  6. Altmetric Badge
    Chapter 5 Privacy-Preserving Observation in Public Spaces
  7. Altmetric Badge
    Chapter 6 Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions
  8. Altmetric Badge
    Chapter 7 Rich Queries on Encrypted Data: Beyond Exact Matches
  9. Altmetric Badge
    Chapter 8 Computer Security -- ESORICS 2015
  10. Altmetric Badge
    Chapter 9 Batch Verifiable Computation of Polynomials on Outsourced Data
  11. Altmetric Badge
    Chapter 10 CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
  12. Altmetric Badge
    Chapter 11 Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment
  13. Altmetric Badge
    Chapter 12 Checking Trace Equivalence: How to Get Rid of Nonces?
  14. Altmetric Badge
    Chapter 13 Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key
  15. Altmetric Badge
    Chapter 14 Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud
  16. Altmetric Badge
    Chapter 15 DexHunter: Toward Extracting Hidden Code from Packed Android Applications
  17. Altmetric Badge
    Chapter 16 Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software
  18. Altmetric Badge
    Chapter 17 vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge
  19. Altmetric Badge
    Chapter 18 Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments
  20. Altmetric Badge
    Chapter 19 A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
  21. Altmetric Badge
    Chapter 20 Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users
  22. Altmetric Badge
    Chapter 21 Towards Attack-Resistant Peer-Assisted Indoor Localization
  23. Altmetric Badge
    Chapter 22 Leveraging Real-Life Facts to Make Random Passwords More Memorable
  24. Altmetric Badge
    Chapter 23 The Emperor’s New Password Creation Policies:
  25. Altmetric Badge
    Chapter 24 A Theory of Gray Security Policies
  26. Altmetric Badge
    Chapter 25 Factorization of Behavioral Integrity
  27. Altmetric Badge
    Chapter 26 Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution
  28. Altmetric Badge
    Chapter 27 Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks
  29. Altmetric Badge
    Chapter 28 Making Bitcoin Exchanges Transparent
  30. Altmetric Badge
    Chapter 29 Web-to-Application Injection Attacks on Android: Characterization and Detection
  31. Altmetric Badge
    Chapter 30 All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines
  32. Altmetric Badge
    Chapter 31 Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
  33. Altmetric Badge
    Chapter 32 On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks
Attention for Chapter 8: Computer Security -- ESORICS 2015
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (84th percentile)
  • High Attention Score compared to outputs of the same age and source (93rd percentile)

Mentioned by

news
1 news outlet
patent
1 patent

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
34 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Computer Security -- ESORICS 2015
Chapter number 8
Book title
Computer Security -- ESORICS 2015
Published in
Lecture notes in computer science, September 2015
DOI 10.1007/978-3-319-24177-7_8
Book ISBNs
978-3-31-924176-0, 978-3-31-924177-7
Authors

Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou, Yang, Yanjiang, Liu, Joseph K., Liang, Kaitai, Choo, Kim-Kwang Raymond, Zhou, Jianying

Editors

Günther Pernul, Peter Y A Ryan, Edgar Weippl

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 34 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 34 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 29%
Student > Master 5 15%
Researcher 4 12%
Professor > Associate Professor 3 9%
Student > Doctoral Student 1 3%
Other 4 12%
Unknown 7 21%
Readers by discipline Count As %
Computer Science 24 71%
Physics and Astronomy 1 3%
Engineering 1 3%
Unknown 8 24%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 10. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 15 December 2020.
All research outputs
#2,952,134
of 22,880,691 outputs
Outputs from Lecture notes in computer science
#638
of 8,130 outputs
Outputs of similar age
#41,988
of 274,349 outputs
Outputs of similar age from Lecture notes in computer science
#9
of 159 outputs
Altmetric has tracked 22,880,691 research outputs across all sources so far. Compared to these this one has done well and is in the 86th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,130 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done particularly well, scoring higher than 91% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 274,349 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 84% of its contemporaries.
We're also able to compare this research output to 159 others from the same source and published within six weeks on either side of this one. This one has done particularly well, scoring higher than 93% of its contemporaries.