↓ Skip to main content

Computer Security - ESORICS 2008

Overview of attention for book
Cover of 'Computer Security - ESORICS 2008'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FW
  3. Altmetric Badge
    Chapter 2 Identifying Critical Attack Assets in Dependency Attack Graphs
  4. Altmetric Badge
    Chapter 3 Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory
  5. Altmetric Badge
    Chapter 4 Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs
  6. Altmetric Badge
    Chapter 5 Efficient Handling of Adversary Attacks in Aggregation Applications
  7. Altmetric Badge
    Chapter 6 Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is Enough
  8. Altmetric Badge
    Chapter 7 Dismantling MIFARE Classic
  9. Altmetric Badge
    Chapter 8 A Browser-Based Kerberos Authentication Scheme
  10. Altmetric Badge
    Chapter 9 CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
  11. Altmetric Badge
    Chapter 10 Disclosure Analysis and Control in Statistical Databases
  12. Altmetric Badge
    Chapter 11 TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead
  13. Altmetric Badge
    Chapter 12 Access Control Friendly Query Verification for Outsourced Data Publishing
  14. Altmetric Badge
    Chapter 13 Sharemind: A Framework for Fast Privacy-Preserving Computations
  15. Altmetric Badge
    Chapter 14 Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms
  16. Altmetric Badge
    Chapter 15 Remote Integrity Check with Dishonest Storage Server
  17. Altmetric Badge
    Chapter 16 A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks
  18. Altmetric Badge
    Chapter 17 RFID Privacy Models Revisited
  19. Altmetric Badge
    Chapter 18 A New Formal Proof Model for RFID Location Privacy
  20. Altmetric Badge
    Chapter 19 Distributed Authorization by Multiparty Trust Negotiation
  21. Altmetric Badge
    Chapter 20 Compositional Refinement of Policies in UML – Exemplified for Access Control
  22. Altmetric Badge
    Chapter 21 On the Security of Delegation in Access Control Systems
  23. Altmetric Badge
    Chapter 22 Termination-Insensitive Noninterference Leaks More Than Just a Bit
  24. Altmetric Badge
    Chapter 23 Security Provisioning in Pervasive Environments Using Multi-objective Optimization
  25. Altmetric Badge
    Chapter 24 Improved Security Notions and Protocols for Non-transferable Identification
  26. Altmetric Badge
    Chapter 25 Human Readable Paper Verification of Prêt à Voter
  27. Altmetric Badge
    Chapter 26 A Distributed Implementation of the Certified Information Access Service
  28. Altmetric Badge
    Chapter 27 Exploring User Reactions to New Browser Cues for Extended Validation Certificates
  29. Altmetric Badge
    Chapter 28 A Framework for the Analysis of Mix-Based Steganographic File Systems
  30. Altmetric Badge
    Chapter 29 An Adaptive Policy-Based Approach to SPIT Management
  31. Altmetric Badge
    Chapter 30 Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?
  32. Altmetric Badge
    Chapter 31 Eureka: A Framework for Enabling Static Malware Analysis
  33. Altmetric Badge
    Chapter 32 New Considerations about the Correct Design of Turbo Fingerprinting Codes
  34. Altmetric Badge
    Chapter 33 Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
  35. Altmetric Badge
    Chapter 34 Cryptographic Protocol Explication and End-Point Projection
  36. Altmetric Badge
    Chapter 35 State Space Reduction in the Maude-NRL Protocol Analyzer
  37. Altmetric Badge
    Chapter 36 Code-Carrying Authorization
  38. Altmetric Badge
    Chapter 37 CPU Bugs, CPU Backdoors and Consequences on Security
Attention for Chapter 17: RFID Privacy Models Revisited
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
26 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
RFID Privacy Models Revisited
Chapter number 17
Book title
Computer Security - ESORICS 2008
Published by
Springer, Berlin, Heidelberg, October 2008
DOI 10.1007/978-3-540-88313-5_17
Book ISBNs
978-3-54-088312-8, 978-3-54-088313-5
Authors

Ching Yu Ng, Willy Susilo, Yi Mu, Rei Safavi-Naini, Ng, Ching Yu, Susilo, Willy, Mu, Yi, Safavi-Naini, Rei

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 26 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 26 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 31%
Student > Master 5 19%
Researcher 3 12%
Lecturer 2 8%
Professor 2 8%
Other 3 12%
Unknown 3 12%
Readers by discipline Count As %
Computer Science 19 73%
Physics and Astronomy 1 4%
Social Sciences 1 4%
Engineering 1 4%
Unknown 4 15%