↓ Skip to main content

Security Protocols XXII

Overview of attention for book
Cover of 'Security Protocols XXII'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Why Bother Securing DNS?
  3. Altmetric Badge
    Chapter 2 Why Bother Securing DNS? (Transcript of Discussion)
  4. Altmetric Badge
    Chapter 3 Collaborating as Normal: Detecting Systemic Anomalies in Your Partner
  5. Altmetric Badge
    Chapter 4 Collaborating as Normal: Detecting Systemic Anomalies in Your Partner (Transcript of Discussion)
  6. Altmetric Badge
    Chapter 5 Remark! : A Secure Protocol for Remote Exams
  7. Altmetric Badge
    Chapter 6 Remark! : A Secure Protocol for Remote Exams (Transcript of Discussion)
  8. Altmetric Badge
    Chapter 7 Red Queen’s Race: APT Win-Win Game
  9. Altmetric Badge
    Chapter 8 Red Queen’s Race: APT Win-Win Game (Transcript of Discussion)
  10. Altmetric Badge
    Chapter 9 Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
  11. Altmetric Badge
    Chapter 10 Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion)
  12. Altmetric Badge
    Chapter 11 Dancing with the Adversary: A Tale of Wimps and Giants
  13. Altmetric Badge
    Chapter 12 Dancing with the Adversary: A Tale of Wimps and Giants (Transcript of Discussion)
  14. Altmetric Badge
    Chapter 13 Security Protocols XXII
  15. Altmetric Badge
    Chapter 14 Better Authentication Password Revolution by Evolution (Transcript of Discussion)
  16. Altmetric Badge
    Chapter 15 Security Protocols XXII
  17. Altmetric Badge
    Chapter 16 Security Protocols XXII
  18. Altmetric Badge
    Chapter 17 Security Protocols XXII
  19. Altmetric Badge
    Chapter 18 Security Protocols XXII
  20. Altmetric Badge
    Chapter 19 Security Protocols XXII
  21. Altmetric Badge
    Chapter 20 Relay Attacks on Visual Code Authentication Schemes (Transcript of Discussion)
  22. Altmetric Badge
    Chapter 21 Censorship Resistance as a Side-Effect
  23. Altmetric Badge
    Chapter 22 Censorship Resistance as a Side-Effect (Transcript of Discussion)
  24. Altmetric Badge
    Chapter 23 On the Feasibility of a Technological Response to the Surveillance Morass
  25. Altmetric Badge
    Chapter 24 On the Feasibility of a Technological Response to the Surveillance Morass (Transcript of Discussion)
  26. Altmetric Badge
    Chapter 25 Strange Bedfellows: How and When to Work with Your Enemy
  27. Altmetric Badge
    Chapter 26 Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion)
  28. Altmetric Badge
    Chapter 27 On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions
  29. Altmetric Badge
    Chapter 28 On the Key Role Intelligence Agencies Can Play to Restore Our Democratic Institutions (Transcript of Discussion)
  30. Altmetric Badge
    Chapter 29 On Node Capturing Attacker Strategies
  31. Altmetric Badge
    Chapter 30 On Node Capturing Attacker Strategies (Transcript of Discussion)
  32. Altmetric Badge
    Chapter 31 On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis
  33. Altmetric Badge
    Chapter 32 On the Reliability of Network Measurement Techniques Used for Malware Traffic Analysis (Transcript of Discussion)
  34. Altmetric Badge
    Chapter 33 Beyond Trust
  35. Altmetric Badge
    Chapter 34 Beyond Trust (Transcript of Discussion)
  36. Altmetric Badge
    Chapter 35 Fawkescoin
  37. Altmetric Badge
    Chapter 36 FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion)
Attention for Chapter 35: Fawkescoin
Altmetric Badge

Mentioned by

twitter
2 X users

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
39 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Fawkescoin
Chapter number 35
Book title
Security Protocols XXII
Published by
Springer, Cham, March 2014
DOI 10.1007/978-3-319-12400-1_35
Book ISBNs
978-3-31-912399-8, 978-3-31-912400-1
Authors

Joseph Bonneau, Andrew Miller, Bonneau, Joseph, Miller, Andrew

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 39 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Brazil 1 3%
Unknown 38 97%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 9 23%
Student > Ph. D. Student 7 18%
Student > Master 5 13%
Researcher 5 13%
Other 4 10%
Other 5 13%
Unknown 4 10%
Readers by discipline Count As %
Computer Science 20 51%
Economics, Econometrics and Finance 5 13%
Engineering 3 8%
Business, Management and Accounting 2 5%
Mathematics 2 5%
Other 2 5%
Unknown 5 13%