↓ Skip to main content

Computer Security – ESORICS 2017

Overview of attention for book
Cover of 'Computer Security – ESORICS 2017'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 From Intrusion Detection to Software Design
  3. Altmetric Badge
    Chapter 2 Justifying Security Measures — a Position Paper
  4. Altmetric Badge
    Chapter 3 The Once and Future Onion
  5. Altmetric Badge
    Chapter 4 Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
  6. Altmetric Badge
    Chapter 5 Tree-Based Cryptographic Access Control
  7. Altmetric Badge
    Chapter 6 Source Code Authorship Attribution Using Long Short-Term Memory Based Networks
  8. Altmetric Badge
    Chapter 7 Is My Attack Tree Correct?
  9. Altmetric Badge
    Chapter 8 Server-Aided Secure Computation with Off-line Parties
  10. Altmetric Badge
    Chapter 9 We Are Family: Relating Information-Flow Trackers
  11. Altmetric Badge
    Chapter 10 Labeled Homomorphic Encryption
  12. Altmetric Badge
    Chapter 11 MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
  13. Altmetric Badge
    Chapter 12 Modular Verification of Protocol Equivalence in the Presence of Randomness
  14. Altmetric Badge
    Chapter 13 Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms
  15. Altmetric Badge
    Chapter 14 Reusing Nonces in Schnorr Signatures
  16. Altmetric Badge
    Chapter 15 WebPol: Fine-Grained Information Flow Policies for Web Browsers
  17. Altmetric Badge
    Chapter 16 Verifying Constant-Time Implementations by Abstract Interpretation
  18. Altmetric Badge
    Chapter 17 Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for Android
  19. Altmetric Badge
    Chapter 18 Zero Round-Trip Time for the Extended Access Control Protocol
  20. Altmetric Badge
    Chapter 19 Server-Supported RSA Signatures for Mobile Devices
  21. Altmetric Badge
    Chapter 20 Verifiable Document Redacting
  22. Altmetric Badge
    Chapter 21 Securing Data Analytics on SGX with Randomization
  23. Altmetric Badge
    Chapter 22 DeltaPhish: Detecting Phishing Webpages in Compromised Websites
  24. Altmetric Badge
    Chapter 23 Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5
  25. Altmetric Badge
    Chapter 24 Per-Session Security: Password-Based Cryptography Revisited
  26. Altmetric Badge
    Chapter 25 AVR Processors as a Platform for Language-Based Security
  27. Altmetric Badge
    Chapter 26 A Better Composition Operator for Quantitative Information Flow Analyses
  28. Altmetric Badge
    Chapter 27 Analyzing the Capabilities of the CAN Attacker
Attention for Chapter 1: From Intrusion Detection to Software Design
Altmetric Badge

Readers on

mendeley
29 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
From Intrusion Detection to Software Design
Chapter number 1
Book title
Computer Security – ESORICS 2017
Published by
Springer, Cham, September 2017
DOI 10.1007/978-3-319-66402-6_1
Book ISBNs
978-3-31-966401-9, 978-3-31-966402-6
Authors

Sandro Etalle, Etalle, Sandro

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 29 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 29 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 9 31%
Student > Master 4 14%
Student > Doctoral Student 2 7%
Student > Bachelor 2 7%
Lecturer 2 7%
Other 6 21%
Unknown 4 14%
Readers by discipline Count As %
Computer Science 19 66%
Engineering 4 14%
Physics and Astronomy 1 3%
Linguistics 1 3%
Unknown 4 14%