↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors
  3. Altmetric Badge
    Chapter 2 Some New Weaknesses in the RC4 Stream Cipher
  4. Altmetric Badge
    Chapter 3 Improvements on Reductions among Different Variants of SVP and CVP
  5. Altmetric Badge
    Chapter 4 A General Method to Evaluate the Correlation of Randomness Tests
  6. Altmetric Badge
    Chapter 5 Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs
  7. Altmetric Badge
    Chapter 6 Dynamic Surveillance: A Case Study with Enron Email Data Set
  8. Altmetric Badge
    Chapter 7 Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications
  9. Altmetric Badge
    Chapter 8 Punobot: Mobile Botnet Using Push Notification Service in Android
  10. Altmetric Badge
    Chapter 9 Bifocals: Analyzing WebView Vulnerabilities in Android Applications
  11. Altmetric Badge
    Chapter 10 We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous
  12. Altmetric Badge
    Chapter 11 Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection
  13. Altmetric Badge
    Chapter 12 SoK: Lessons Learned from SSL/TLS Attacks
  14. Altmetric Badge
    Chapter 13 Foundational Security Principles for Medical Application Platforms
  15. Altmetric Badge
    Chapter 14 Network Iron Curtain: Hide Enterprise Networks with OpenFlow
  16. Altmetric Badge
    Chapter 15 Towards a Methodical Evaluation of Antivirus Scans and Labels
  17. Altmetric Badge
    Chapter 16 Assured Supraliminal Steganography in Computer Games
  18. Altmetric Badge
    Chapter 17 A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks
Attention for Chapter 12: SoK: Lessons Learned from SSL/TLS Attacks
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
58 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
SoK: Lessons Learned from SSL/TLS Attacks
Chapter number 12
Book title
Information Security Applications
Published by
Springer, Cham, August 2013
DOI 10.1007/978-3-319-05149-9_12
Book ISBNs
978-3-31-905148-2, 978-3-31-905149-9
Authors

Christopher Meyer, Jörg Schwenk

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 58 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 58 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 12 21%
Student > Master 11 19%
Student > Bachelor 5 9%
Researcher 4 7%
Professor 3 5%
Other 9 16%
Unknown 14 24%
Readers by discipline Count As %
Computer Science 35 60%
Engineering 3 5%
Chemistry 2 3%
Economics, Econometrics and Finance 1 2%
Biochemistry, Genetics and Molecular Biology 1 2%
Other 2 3%
Unknown 14 24%