↓ Skip to main content

Security Protocols XXIII

Overview of attention for book
Cover of 'Security Protocols XXIII'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 The Dark Side of the Code
  3. Altmetric Badge
    Chapter 2 The Dark Side of the Code (Transcript of Discussion)
  4. Altmetric Badge
    Chapter 3 Redesigning Secure Protocols to Compel Security Checks
  5. Altmetric Badge
    Chapter 4 Redesigning Secure Protocols to Compel Security Checks (Transcript of Discussion)
  6. Altmetric Badge
    Chapter 5 Derailing Attacks
  7. Altmetric Badge
    Chapter 6 Derailing Attacks (Transcript of Discussion)
  8. Altmetric Badge
    Chapter 7 Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction
  9. Altmetric Badge
    Chapter 8 Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction (Transcript of Discussion)
  10. Altmetric Badge
    Chapter 9 Mind Your \((R, \varPhi )\) s: Location-Based Privacy Controls for Consumer Drones
  11. Altmetric Badge
    Chapter 10 Mind Your \((R, \varPhi )\) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)
  12. Altmetric Badge
    Chapter 11 Location-Private Interstellar Communication
  13. Altmetric Badge
    Chapter 12 Location-Private Interstellar Communication (Transcript of Discussion)
  14. Altmetric Badge
    Chapter 13 The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface
  15. Altmetric Badge
    Chapter 14 The Lifetime of Android API Vulnerabilities: Case Study on the JavaScript-to-Java Interface (Transcript of Discussion)
  16. Altmetric Badge
    Chapter 15 Challenges of Fiction in Network Security – Perspective of Virtualized Environments
  17. Altmetric Badge
    Chapter 16 Challenges of Fiction in Network Security – Perspective of Virtualised Environments (Transcript of Discussion)
  18. Altmetric Badge
    Chapter 17 Device Attacker Models: Fact and Fiction
  19. Altmetric Badge
    Chapter 18 Device Attacker Models: Fact and Fiction (Transcript of Discussion)
  20. Altmetric Badge
    Chapter 19 Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy
  21. Altmetric Badge
    Chapter 20 Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion)
  22. Altmetric Badge
    Chapter 21 Pico Without Public Keys
  23. Altmetric Badge
    Chapter 22 Pico Without Public Keys (Transcript of Discussion)
  24. Altmetric Badge
    Chapter 23 Do You Believe in Tinker Bell? The Social Externalities of Trust
  25. Altmetric Badge
    Chapter 24 Do You Believe in Tinker Bell? The Social Externalities of Trust (Transcript of Discussion)
  26. Altmetric Badge
    Chapter 25 Security is Beautiful
  27. Altmetric Badge
    Chapter 26 Security is Beautiful (Transcript of Discussion)
  28. Altmetric Badge
    Chapter 27 On the Use of Security and Privacy Technology as a Plot Device
  29. Altmetric Badge
    Chapter 28 On the Use of Security and Privacy Technology as a Plot Device (Transcript of Discussion)
  30. Altmetric Badge
    Chapter 29 Bitcoin: Perils of an Unregulated Global P2P Currency
  31. Altmetric Badge
    Chapter 30 Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion)
  32. Altmetric Badge
    Chapter 31 Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can?
  33. Altmetric Badge
    Chapter 32 Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? (Transcript of Discussion)
  34. Altmetric Badge
    Chapter 33 Information Leakage Due to Revealing Randomly Selected Bits
  35. Altmetric Badge
    Chapter 34 Information Leakage Due to Revealing Randomly Selected Bits (Transcript of Discussion)
  36. Altmetric Badge
    Chapter 35 Efficient Data Intensive Secure Computation: Fictional or Real?
  37. Altmetric Badge
    Chapter 36 Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion)
Attention for Chapter 3: Redesigning Secure Protocols to Compel Security Checks
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Redesigning Secure Protocols to Compel Security Checks
Chapter number 3
Book title
Security Protocols XXIII
Published by
Springer International Publishing, January 2015
DOI 10.1007/978-3-319-26096-9_3
Book ISBNs
978-3-31-926095-2, 978-3-31-926096-9
Authors

Keith Irwin, Irwin, Keith

Editors

Bruce Christianson, Petr Švenda, Vashek Matyáš, James Malcolm, Frank Stajano, Jonathan Anderson

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 50%
Other 1 50%
Readers by discipline Count As %
Computer Science 2 100%