↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors
  3. Altmetric Badge
    Chapter 2 Some New Weaknesses in the RC4 Stream Cipher
  4. Altmetric Badge
    Chapter 3 Improvements on Reductions among Different Variants of SVP and CVP
  5. Altmetric Badge
    Chapter 4 A General Method to Evaluate the Correlation of Randomness Tests
  6. Altmetric Badge
    Chapter 5 Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs
  7. Altmetric Badge
    Chapter 6 Dynamic Surveillance: A Case Study with Enron Email Data Set
  8. Altmetric Badge
    Chapter 7 Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications
  9. Altmetric Badge
    Chapter 8 Punobot: Mobile Botnet Using Push Notification Service in Android
  10. Altmetric Badge
    Chapter 9 Bifocals: Analyzing WebView Vulnerabilities in Android Applications
  11. Altmetric Badge
    Chapter 10 We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous
  12. Altmetric Badge
    Chapter 11 Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection
  13. Altmetric Badge
    Chapter 12 SoK: Lessons Learned from SSL/TLS Attacks
  14. Altmetric Badge
    Chapter 13 Foundational Security Principles for Medical Application Platforms
  15. Altmetric Badge
    Chapter 14 Network Iron Curtain: Hide Enterprise Networks with OpenFlow
  16. Altmetric Badge
    Chapter 15 Towards a Methodical Evaluation of Antivirus Scans and Labels
  17. Altmetric Badge
    Chapter 16 Assured Supraliminal Steganography in Computer Games
  18. Altmetric Badge
    Chapter 17 A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
2 patents
wikipedia
1 Wikipedia page

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
13 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Applications
Published by
Springer, Cham, January 2013
DOI 10.1007/978-3-319-05149-9
ISBNs
978-3-31-905148-2, 978-3-31-905149-9
Editors

Yongdae Kim, Heejo Lee, Adrian Perrig

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 13 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Korea, Republic of 1 8%
Unknown 12 92%

Demographic breakdown

Readers by professional status Count As %
Student > Master 3 23%
Lecturer 2 15%
Student > Bachelor 2 15%
Student > Doctoral Student 2 15%
Student > Ph. D. Student 2 15%
Other 2 15%
Readers by discipline Count As %
Computer Science 9 69%
Engineering 4 31%