↓ Skip to main content

Security Protocols XIX

Overview of attention for book
Cover of 'Security Protocols XIX'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Introduction: Alice Doesn’t Live Here Anymore (Transcript)
  3. Altmetric Badge
    Chapter 2 His Late Master’s Voice: Barking for Location Privacy
  4. Altmetric Badge
    Chapter 3 His Late Master’s Voice (Transcript of Discussion)
  5. Altmetric Badge
    Chapter 4 Security Protocols XIX
  6. Altmetric Badge
    Chapter 5 Security Protocols XIX
  7. Altmetric Badge
    Chapter 6 Pico: No More Passwords!
  8. Altmetric Badge
    Chapter 7 Security Protocols XIX
  9. Altmetric Badge
    Chapter 8 Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords
  10. Altmetric Badge
    Chapter 9 Getting Web Authentication Right (Transcript of Discussion)
  11. Altmetric Badge
    Chapter 10 When Context Is Better Than Identity: Authentication by Context Using Empirical Channels
  12. Altmetric Badge
    Chapter 11 When Context Is Better Than Identity (Transcript of Discussion)
  13. Altmetric Badge
    Chapter 12 Selective Location Blinding Using Hash Chains
  14. Altmetric Badge
    Chapter 13 Selective Location Blinding Using Hash Chains (Transcript of Discussion)
  15. Altmetric Badge
    Chapter 14 Risks of Blind Controllers and Deaf Views in Model View Controller Patterns for Multitag User Interfaces
  16. Altmetric Badge
    Chapter 15 Risk of Blind Controller Patterns for Multitag User Interfaces (Transcript of Discussion)
  17. Altmetric Badge
    Chapter 16 How to Sync with Alice
  18. Altmetric Badge
    Chapter 17 How to Sync with Alice (Transcript of Discussion)
  19. Altmetric Badge
    Chapter 18 Attack Detection vs. Privacy – How to Find the Link or How to Hide It?
  20. Altmetric Badge
    Chapter 19 Attack Detection vs Privacy – How to Find the Link or How to Hide It (Transcript of Discussion)
  21. Altmetric Badge
    Chapter 20 The Sense of Security and a Countermeasure for the False Sense
  22. Altmetric Badge
    Chapter 21 The Sense of Security and a Countermeasure for the False Sense (Transcript of Discussion)
  23. Altmetric Badge
    Chapter 22 Towards a Theory of Trust in Networks of Humans and Computers
  24. Altmetric Badge
    Chapter 23 Towards a Theory of Trust in Networks of Humans and Computers (Transcript of Discussion)
  25. Altmetric Badge
    Chapter 24 Gearing Up: How to Eat Your Cryptocake and Still Have It
  26. Altmetric Badge
    Chapter 25 Gearing Up: How to Eat Your Cryptocake and Still Have It (Transcript of Discussion)
  27. Altmetric Badge
    Chapter 26 Security Protocols XIX
  28. Altmetric Badge
    Chapter 27 Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion)
  29. Altmetric Badge
    Chapter 28 Scrambling for Lightweight Censorship Resistance
  30. Altmetric Badge
    Chapter 29 Scrambling for Lightweight Censorship Resistance (Transcript of Discussion)
  31. Altmetric Badge
    Chapter 30 The Metaplace Security Model
  32. Altmetric Badge
    Chapter 31 The Metaplace Security Model (Transcript of Discussion)
  33. Altmetric Badge
    Chapter 32 One-Way Cryptography
  34. Altmetric Badge
    Chapter 33 One-Way Cryptography (Transcript of Discussion)
  35. Altmetric Badge
    Chapter 34 Security Protocols XIX
  36. Altmetric Badge
    Chapter 35 How to Keep Bad Papers Out of Conferences (Transcript of Discussion)
Attention for Chapter 10: When Context Is Better Than Identity: Authentication by Context Using Empirical Channels
Altmetric Badge

Readers on

mendeley
5 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
When Context Is Better Than Identity: Authentication by Context Using Empirical Channels
Chapter number 10
Book title
Security Protocols XIX
Published by
Springer, Berlin, Heidelberg, March 2011
DOI 10.1007/978-3-642-25867-1_10
Book ISBNs
978-3-64-225866-4, 978-3-64-225867-1
Authors

Bangdao Chen, Long Hoang Nguyen, Andrew William Roscoe, Chen, Bangdao, Nguyen, Long Hoang, Roscoe, Andrew William

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 5 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Canada 1 20%
Unknown 4 80%

Demographic breakdown

Readers by professional status Count As %
Other 1 20%
Student > Doctoral Student 1 20%
Student > Bachelor 1 20%
Student > Ph. D. Student 1 20%
Professor > Associate Professor 1 20%
Other 0 0%
Readers by discipline Count As %
Computer Science 4 80%
Engineering 1 20%