↓ Skip to main content

Security and Privacy in the Age of Ubiquitous Computing

Overview of attention for book
Cover of 'Security and Privacy in the Age of Ubiquitous Computing'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Accountable Anonymous E-Mail
  3. Altmetric Badge
    Chapter 2 Protecting Consumer Data in Composite Web Services
  4. Altmetric Badge
    Chapter 3 A Decision Matrix Approach
  5. Altmetric Badge
    Chapter 4 Assignment of Security Clearances in an Organization
  6. Altmetric Badge
    Chapter 5 Tool Supported Management of Information Security Culture
  7. Altmetric Badge
    Chapter 6 ERPSEC - A Reference Framework to Enhance Security in ERP Systems
  8. Altmetric Badge
    Chapter 7 A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises
  9. Altmetric Badge
    Chapter 8 A Secure Quantum Communication Protocol Using Insecure Public Channels
  10. Altmetric Badge
    Chapter 9 Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems
  11. Altmetric Badge
    Chapter 10 Design and Implementation of TPM SUP320
  12. Altmetric Badge
    Chapter 11 Mathematical Models of IP Traceback Methods and Their Verification
  13. Altmetric Badge
    Chapter 12 Transferable E-Cash Revisit
  14. Altmetric Badge
    Chapter 13 A License Transfer System for Supporting Content Portability in Digital Rights Management
  15. Altmetric Badge
    Chapter 14 Secure Human Communications Based on Biometrics Signals
  16. Altmetric Badge
    Chapter 15 Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks
  17. Altmetric Badge
    Chapter 16 An Adaptive Polling Scheme for IEEE 802.11 Wireless LAN
  18. Altmetric Badge
    Chapter 17 The Pairing Problem with User Interaction
  19. Altmetric Badge
    Chapter 18 Network Smart Card
  20. Altmetric Badge
    Chapter 19 Protection Against Spam Using Pre-Challenges
  21. Altmetric Badge
    Chapter 20 Automatically Hardening Web Applications Using Precise Tainting
  22. Altmetric Badge
    Chapter 21 Traffic Redirection Attack Protection System (TRAPS)
  23. Altmetric Badge
    Chapter 22 Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks
  24. Altmetric Badge
    Chapter 23 Design, Implementation, and Evaluation of Fritrace
  25. Altmetric Badge
    Chapter 24 Design and Implementation of a High-Performance Network Intrusion Prevention System
  26. Altmetric Badge
    Chapter 25 Security and Privacy in the Age of Ubiquitous Computing
  27. Altmetric Badge
    Chapter 26 Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion Detection
  28. Altmetric Badge
    Chapter 27 Designated-Verifier Proxy Signature Schemes
  29. Altmetric Badge
    Chapter 28 Tripartite Concurrent Signatures
  30. Altmetric Badge
    Chapter 29 Signcryption in Hierarchical Identity Based Cryptosystem
  31. Altmetric Badge
    Chapter 30 Protecting Group Dynamic Information in Large Scale Multicast Groups
  32. Altmetric Badge
    Chapter 31 Secure Group Communication with Distributed Generation of Private Keys for Ad-Hoc Networks
  33. Altmetric Badge
    Chapter 32 Ensuring Media Integrity on Third-Party Infrastructures
  34. Altmetric Badge
    Chapter 33 A New Fragile Mesh Watermarking Algorithm for Authentication
  35. Altmetric Badge
    Chapter 34 New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images
  36. Altmetric Badge
    Chapter 35 Overcoming Channel Bandwidth Constraints in Secure SIM Applications
  37. Altmetric Badge
    Chapter 36 On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation
  38. Altmetric Badge
    Chapter 37 On-the-Fly Formal Testing of a Smart Card Applet
  39. Altmetric Badge
    Chapter 38 A Computationally Feasible SPA Attack on AES VIA Optimized Search
  40. Altmetric Badge
    Chapter 39 The Proof by 2M-1: A Low-Cost Method to Check Arithmetic Computations
  41. Altmetric Badge
    Chapter 40 Streamto: Streaming Content Using a Tamper-Resistant Token
Attention for Chapter 24: Design and Implementation of a High-Performance Network Intrusion Prevention System
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
7 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Design and Implementation of a High-Performance Network Intrusion Prevention System
Chapter number 24
Book title
Security and Privacy in the Age of Ubiquitous Computing
Published by
Springer, Boston, MA, May 2005
DOI 10.1007/0-387-25660-1_24
Book ISBNs
978-0-387-25658-0, 978-0-387-25660-3
Authors

Konstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 7 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 7 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 29%
Researcher 2 29%
Other 1 14%
Student > Doctoral Student 1 14%
Unknown 1 14%
Readers by discipline Count As %
Computer Science 5 71%
Engineering 1 14%
Unknown 1 14%