↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Impacts of Security Protocols on Real-Time Multimedia Communications
  3. Altmetric Badge
    Chapter 2 An Improvement on Privacy and Authentication in GSM
  4. Altmetric Badge
    Chapter 3 Encrypted Watermarks and Linux Laptop Security
  5. Altmetric Badge
    Chapter 4 Inconsistency Detection of Authorization Policies in Distributed Component Environment
  6. Altmetric Badge
    Chapter 5 Custodian-Hiding Verifiable Encryption
  7. Altmetric Badge
    Chapter 6 Proving Key Usage
  8. Altmetric Badge
    Chapter 7 Public Key Encryption with Conjunctive Field Keyword Search
  9. Altmetric Badge
    Chapter 8 A Probabilistic Method for Detecting Anomalous Program Behavior
  10. Altmetric Badge
    Chapter 9 Service Discrimination and Audit File Reduction for Effective Intrusion Detection
  11. Altmetric Badge
    Chapter 10 IDS False Alarm Filtering Using KNN Classifier
  12. Altmetric Badge
    Chapter 11 Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
  13. Altmetric Badge
    Chapter 12 Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment
  14. Altmetric Badge
    Chapter 13 Efficient Authenticated Key Agreement Protocol for Dynamic Groups
  15. Altmetric Badge
    Chapter 14 A Ring Signature Scheme Using Bilinear Pairings
  16. Altmetric Badge
    Chapter 15 Verifiable Pairing and Its Applications
  17. Altmetric Badge
    Chapter 16 Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading
  18. Altmetric Badge
    Chapter 17 An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks
  19. Altmetric Badge
    Chapter 18 Application of Content Computing in Honeyfarm
  20. Altmetric Badge
    Chapter 19 License Protection with a Tamper-Resistant Token
  21. Altmetric Badge
    Chapter 20 An Adaptive Approach to Hardware Alteration for Digital Rights Management
  22. Altmetric Badge
    Chapter 21 Dynamic Fingerprinting over Broadcast Using Revocation Scheme
  23. Altmetric Badge
    Chapter 22 Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels
  24. Altmetric Badge
    Chapter 23 Vulnerability of a Mobile Payment System Proposed at WISA 2002
  25. Altmetric Badge
    Chapter 24 Fair Offline Payment Using Verifiable Encryption
  26. Altmetric Badge
    Chapter 25 A Limited-Used Key Generation Scheme for Internet Transactions
  27. Altmetric Badge
    Chapter 26 Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes
  28. Altmetric Badge
    Chapter 27 Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II
  29. Altmetric Badge
    Chapter 28 Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
  30. Altmetric Badge
    Chapter 29 Hyperelliptic Curve Coprocessors on a FPGA
  31. Altmetric Badge
    Chapter 30 Key-Exchange Protocol Using Pre-agreed Session-ID
  32. Altmetric Badge
    Chapter 31 A New k-Anonymous Message Transmission Protocol
  33. Altmetric Badge
    Chapter 32 Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack
  34. Altmetric Badge
    Chapter 33 Side Channel Cryptanalysis on SEED
  35. Altmetric Badge
    Chapter 34 Secure and Efficient AES Software Implementation for Smart Cards
  36. Altmetric Badge
    Chapter 35 Practical Template Attacks
  37. Altmetric Badge
    Chapter 36 Evaluation and Improvement of the Tempest Fonts
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
2 patents

Citations

dimensions_citation
22 Dimensions

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Applications
Published by
Springer, Berlin, Heidelberg, January 2004
DOI 10.1007/b103174
ISBNs
978-3-54-024015-0, 978-3-54-031815-6
Editors

Chae Hoon Lim, Moti Yung

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 21 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 5%
Lecturer > Senior Lecturer 1 5%
Student > Master 1 5%
Unknown 18 86%
Readers by discipline Count As %
Chemical Engineering 1 5%
Computer Science 1 5%
Engineering 1 5%
Unknown 18 86%