↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection
  3. Altmetric Badge
    Chapter 2 Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks
  4. Altmetric Badge
    Chapter 3 The Security Defect of a Multi-pixel Encoding Method
  5. Altmetric Badge
    Chapter 4 Encrypted Secret Sharing and Analysis by Plaintext Randomization
  6. Altmetric Badge
    Chapter 5 Round-Efficient Private Stable Matching from Additive Homomorphic Encryption
  7. Altmetric Badge
    Chapter 6 Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption
  8. Altmetric Badge
    Chapter 7 Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length
  9. Altmetric Badge
    Chapter 8 4GMOP: Mopping Malware Initiated SMS Traffic in Mobile Networks
  10. Altmetric Badge
    Chapter 9 Design and Analysis of a Sophisticated Malware Attack Against Smart Grid
  11. Altmetric Badge
    Chapter 10 Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs
  12. Altmetric Badge
    Chapter 11 Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA
  13. Altmetric Badge
    Chapter 12 Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited
  14. Altmetric Badge
    Chapter 13 Factoring a Multiprime Modulus N with Random Bits
  15. Altmetric Badge
    Chapter 14 Faster 128-EEA3 and 128-EIA3 Software
  16. Altmetric Badge
    Chapter 15 Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases
  17. Altmetric Badge
    Chapter 16 Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
  18. Altmetric Badge
    Chapter 17 Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices
  19. Altmetric Badge
    Chapter 18 Practical and provably secure distance-bounding
  20. Altmetric Badge
    Chapter 19 On the Viability of CAPTCHAs for use in Telephony Systems: A Usability Field Study
  21. Altmetric Badge
    Chapter 20 Cars, Condoms, and Facebook
  22. Altmetric Badge
    Chapter 21 Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data
  23. Altmetric Badge
    Chapter 22 Fine-Grained Access Control for HTML5-Based Mobile Applications in Android
  24. Altmetric Badge
    Chapter 23 CrowdFlow: Efficient Information Flow Security
  25. Altmetric Badge
    Chapter 24 DroidTest: Testing Android Applications for Leakage of Private Information
  26. Altmetric Badge
    Chapter 25 A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites
  27. Altmetric Badge
    Chapter 26 An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles
  28. Altmetric Badge
    Chapter 27 Human Assisted Randomness Generation Using Video Games
  29. Altmetric Badge
    Chapter 28 Security Ranking Among Assumptions Within the Uber Assumption Framework
  30. Altmetric Badge
    Chapter 29 A Secure and Efficient Method for Scalar Multiplication on Supersingular Elliptic Curves over Binary Fields
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security
Published by
Springer, Cham, December 2015
DOI 10.1007/978-3-319-27659-5
ISBNs
978-3-31-927658-8, 978-3-31-927659-5
Editors

Yvo Desmedt

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 1 100%
Readers by discipline Count As %
Computer Science 1 100%