↓ Skip to main content

Information Security and Cryptology

Overview of attention for book
Cover of 'Information Security and Cryptology'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
  3. Altmetric Badge
    Chapter 2 You Can Prove So Many Things in Zero-Knowledge
  4. Altmetric Badge
    Chapter 3 Improvements on Security Proofs of Some Identity Based Encryption Schemes
  5. Altmetric Badge
    Chapter 4 An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme
  6. Altmetric Badge
    Chapter 5 ID-Based Signature Scheme Without Trusted PKG
  7. Altmetric Badge
    Chapter 6 Specifying Authentication Using Signal Events in CSP
  8. Altmetric Badge
    Chapter 7 Modeling RFID Security
  9. Altmetric Badge
    Chapter 8 Enforcing Email Addresses Privacy Using Tokens
  10. Altmetric Badge
    Chapter 9 Efficient Authentication of Electronic Document Workflow
  11. Altmetric Badge
    Chapter 10 Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms
  12. Altmetric Badge
    Chapter 11 Efficient Group Signatures from Bilinear Pairing
  13. Altmetric Badge
    Chapter 12 Enhanced Aggregate Signatures from Pairings
  14. Altmetric Badge
    Chapter 13 Constructing Secure Proxy Cryptosystem
  15. Altmetric Badge
    Chapter 14 Towards a General RC4-Like Keystream Generator
  16. Altmetric Badge
    Chapter 15 HCTR: A Variable-Input-Length Enciphering Mode
  17. Altmetric Badge
    Chapter 16 The k th-Order Quasi-Generalized Bent Functions over Ring Z p
  18. Altmetric Badge
    Chapter 17 A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences
  19. Altmetric Badge
    Chapter 18 An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP
  20. Altmetric Badge
    Chapter 19 An Improved Secure Two-Party Computation Protocol
  21. Altmetric Badge
    Chapter 20 Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes
  22. Altmetric Badge
    Chapter 21 ID-Based Threshold Unsigncryption Scheme from Pairings
  23. Altmetric Badge
    Chapter 22 Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach
  24. Altmetric Badge
    Chapter 23 The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control
  25. Altmetric Badge
    Chapter 24 Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection
  26. Altmetric Badge
    Chapter 25 Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes
  27. Altmetric Badge
    Chapter 26 An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption
  28. Altmetric Badge
    Chapter 27 A Remark on Implementing the Weil Pairing
  29. Altmetric Badge
    Chapter 28 Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC
  30. Altmetric Badge
    Chapter 29 Key Management for Secure Overlay Multicast
  31. Altmetric Badge
    Chapter 30 Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN
  32. Altmetric Badge
    Chapter 31 Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault
  33. Altmetric Badge
    Chapter 32 Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes
  34. Altmetric Badge
    Chapter 33 New Methods to Construct Cheating Immune Multisecret Sharing Scheme
  35. Altmetric Badge
    Chapter 34 Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation
  36. Altmetric Badge
    Chapter 35 MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
6 Dimensions
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Cryptology
Published by
Springer, December 2005
DOI 10.1007/11599548
ISBNs
978-3-54-032424-9, 978-3-54-030855-3
Editors

Feng, Dengguo, Lin, Dongdai, Yung, Moti

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.