↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On the Minimal Assumptions of Group Signature Schemes
  3. Altmetric Badge
    Chapter 2 Perfect Concurrent Signature Schemes
  4. Altmetric Badge
    Chapter 3 New Identity-Based Ring Signature Schemes
  5. Altmetric Badge
    Chapter 4 On the Security of a Multi-party Certified Email Protocol
  6. Altmetric Badge
    Chapter 5 Robust Metering Schemes for General Access Structures
  7. Altmetric Badge
    Chapter 6 PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks
  8. Altmetric Badge
    Chapter 7 Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN
  9. Altmetric Badge
    Chapter 8 Provably Secure Authenticated Tree Based Group Key Agreement
  10. Altmetric Badge
    Chapter 9 Taxonomic Consideration to OAEP Variants and Their Security
  11. Altmetric Badge
    Chapter 10 Factorization-Based Fail-Stop Signatures Revisited
  12. Altmetric Badge
    Chapter 11 A Qualitative Evaluation of Security Patterns
  13. Altmetric Badge
    Chapter 12 Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases
  14. Altmetric Badge
    Chapter 13 Volatile Memory Computer Forensics to Detect Kernel Level Compromise
  15. Altmetric Badge
    Chapter 14 A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet
  16. Altmetric Badge
    Chapter 15 Hydan: Hiding Information in Program Binaries
  17. Altmetric Badge
    Chapter 16 A Semi-fragile Steganographic Digital Signature for Images
  18. Altmetric Badge
    Chapter 17 Identification of Traitors Using a Trellis
  19. Altmetric Badge
    Chapter 18 Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
  20. Altmetric Badge
    Chapter 19 Reflector Attack Traceback System with Pushback Based iTrace Mechanism
  21. Altmetric Badge
    Chapter 20 Automatic Covert Channel Analysis of a Multilevel Secure Component
  22. Altmetric Badge
    Chapter 21 Sound Approximations to Diffie-Hellman Using Rewrite Rules
  23. Altmetric Badge
    Chapter 22 On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks
  24. Altmetric Badge
    Chapter 23 New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm
  25. Altmetric Badge
    Chapter 24 Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure
  26. Altmetric Badge
    Chapter 25 Modelling Dependencies Between Classifiers in Mobile Masquerader Detection
  27. Altmetric Badge
    Chapter 26 Threat Analysis on NEtwork MObility (NEMO)
  28. Altmetric Badge
    Chapter 27 Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept
  29. Altmetric Badge
    Chapter 28 Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
  30. Altmetric Badge
    Chapter 29 Secret-Public Storage Trade-Off for Broadcast Encryption Key Management
  31. Altmetric Badge
    Chapter 30 Security Analysis of the Generalized Self-shrinking Generator
  32. Altmetric Badge
    Chapter 31 On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis
  33. Altmetric Badge
    Chapter 32 On Some Weak Extensions of AES and BES
  34. Altmetric Badge
    Chapter 33 Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario
  35. Altmetric Badge
    Chapter 34 Transient Fault Induction Attacks on XTR
  36. Altmetric Badge
    Chapter 35 Adaptive-CCA on OpenPGP Revisited
  37. Altmetric Badge
    Chapter 36 A New Key-Insulated Signature Scheme
  38. Altmetric Badge
    Chapter 37 Secure Hierarchical Identity Based Signature and Its Application
  39. Altmetric Badge
    Chapter 38 Multi-designated Verifiers Signatures
  40. Altmetric Badge
    Chapter 39 Dynamic Access Control for Multi-privileged Group Communications
  41. Altmetric Badge
    Chapter 40 An Efficient Authentication Scheme Using Recovery Information in Signature
  42. Altmetric Badge
    Chapter 41 Time-Scoped Searching of Encrypted Audit Logs
  43. Altmetric Badge
    Chapter 42 Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems
Attention for Chapter 12: Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases
Altmetric Badge

Mentioned by

facebook
1 Facebook page

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
22 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases
Chapter number 12
Book title
Information and Communications Security
Published in
Lecture notes in computer science, October 2004
DOI 10.1007/978-3-540-30191-2_12
Book ISBNs
978-3-54-023563-7, 978-3-54-030191-2
Authors

Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara, Ishihara, Yasunori, Shimakawa, Yumi, Fujiwara, Toru

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 22 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 22 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 32%
Student > Master 4 18%
Researcher 3 14%
Professor 3 14%
Other 1 5%
Other 2 9%
Unknown 2 9%
Readers by discipline Count As %
Computer Science 18 82%
Agricultural and Biological Sciences 1 5%
Physics and Astronomy 1 5%
Unknown 2 9%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 27 January 2014.
All research outputs
#20,217,843
of 22,741,406 outputs
Outputs from Lecture notes in computer science
#6,982
of 8,126 outputs
Outputs of similar age
#60,570
of 62,248 outputs
Outputs of similar age from Lecture notes in computer science
#25
of 28 outputs
Altmetric has tracked 22,741,406 research outputs across all sources so far. This one is in the 1st percentile – i.e., 1% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,126 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 1st percentile – i.e., 1% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 62,248 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 1st percentile – i.e., 1% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 28 others from the same source and published within six weeks on either side of this one. This one is in the 1st percentile – i.e., 1% of its contemporaries scored the same or lower than it.