↓ Skip to main content

Security Protocols XXVI

Overview of attention for book
Cover of 'Security Protocols XXVI'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Raven Authentication Service
  3. Altmetric Badge
    Chapter 2 Raven Authentication Service Attacks and Countermeasures (Transcript of Discussion)
  4. Altmetric Badge
    Chapter 3 Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations
  5. Altmetric Badge
    Chapter 4 Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion)
  6. Altmetric Badge
    Chapter 5 Non-monotonic Security Protocols and Failures in Financial Intermediation
  7. Altmetric Badge
    Chapter 6 Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion)
  8. Altmetric Badge
    Chapter 7 HoneyPAKEs
  9. Altmetric Badge
    Chapter 8 HoneyPAKEs (Transcript of Discussion)
  10. Altmetric Badge
    Chapter 9 Entropy Crowdsourcing – Protocols for Link Key Updates in Wireless Sensor Networks
  11. Altmetric Badge
    Chapter 10 Entropy Crowdsourcing – Protocols for Link Key Updates in Wireless Sensor Networks (Transcript of Discussion)
  12. Altmetric Badge
    Chapter 11 Daemones Non Operantur Nisi Per Artem
  13. Altmetric Badge
    Chapter 12 Daemones Non Operantur Nisi Per Artem
  14. Altmetric Badge
    Chapter 13 Intentionality and Agency in Security
  15. Altmetric Badge
    Chapter 14 Intentionality and Agency in Security (Transcript of Discussion)
  16. Altmetric Badge
    Chapter 15 Incentives in Security Protocols
  17. Altmetric Badge
    Chapter 16 Incentives in Security Protocols (Transcript of Discussion)
  18. Altmetric Badge
    Chapter 17 Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System
  19. Altmetric Badge
    Chapter 18 Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System (Transcript of Discussion)
  20. Altmetric Badge
    Chapter 19 How Does Match-Fixing Inform Computer Game Security?
  21. Altmetric Badge
    Chapter 20 How Does Match-Fixing Inform Computer Game Security? (Transcript of Discussion)
  22. Altmetric Badge
    Chapter 21 From Secure Messaging to Secure Collaboration
  23. Altmetric Badge
    Chapter 22 From Secure Messaging to Secure Collaboration (Transcript of Discussion)
  24. Altmetric Badge
    Chapter 23 Requirements for Root of Trust Establishment
  25. Altmetric Badge
    Chapter 24 Requirements for Root of Trust Establishment (Transcript of Discussion)
  26. Altmetric Badge
    Chapter 25 User Authentication for the Internet of Things
  27. Altmetric Badge
    Chapter 26 User Authentication for the Internet of Things (Transcript of Discussion)
  28. Altmetric Badge
    Chapter 27 Why Preventing a Cryptocurrency Exchange Heist Isn’t Good Enough
  29. Altmetric Badge
    Chapter 28 Why Preventing a Cryptocurrency Heist Isn’t Good Enough (Transcript of Discussion)
  30. Altmetric Badge
    Chapter 29 Making Bitcoin Legal
  31. Altmetric Badge
    Chapter 30 Making Bitcoin Legal (Transcript of Discussion)
  32. Altmetric Badge
    Chapter 31 On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can’t Do
  33. Altmetric Badge
    Chapter 32 On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can’t Do (Transcript of Discussion)
  34. Altmetric Badge
    Chapter 33 Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices
  35. Altmetric Badge
    Chapter 34 Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion)
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
6 tweeters

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Security Protocols XXVI
Published by
Springer International Publishing, January 2019
DOI 10.1007/978-3-030-03251-7
ISBNs
978-3-03-003250-0, 978-3-03-003251-7
Editors

Matyáš, Vashek, Švenda, Petr, Stajano, Frank, Christianson, Bruce, Anderson, Jonathan

Twitter Demographics

The data shown below were collected from the profiles of 6 tweeters who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 33%
Professor > Associate Professor 1 33%
Student > Bachelor 1 33%
Readers by discipline Count As %
Environmental Science 1 33%
Computer Science 1 33%
Engineering 1 33%