↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Revisiting Software Protection
  3. Altmetric Badge
    Chapter 2 Enabling Shared Audit Data
  4. Altmetric Badge
    Chapter 3 Cryptographically Generated Addresses (CGA)
  5. Altmetric Badge
    Chapter 4 Validating and Securing Spontaneous Associations between Wireless Devices
  6. Altmetric Badge
    Chapter 5 Single Sign-On Using Trusted Platforms
  7. Altmetric Badge
    Chapter 6 Easy Verifiable Primitives and Practical Public Key Cryptosystems
  8. Altmetric Badge
    Chapter 7 Reactively Secure Signature Schemes
  9. Altmetric Badge
    Chapter 8 Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation
  10. Altmetric Badge
    Chapter 9 A Fast Signature Scheme Based on New On-line Computation
  11. Altmetric Badge
    Chapter 10 Distributed RSA Signature Schemes for General Access Structures
  12. Altmetric Badge
    Chapter 11 Divisible Voting Scheme
  13. Altmetric Badge
    Chapter 12 Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations
  14. Altmetric Badge
    Chapter 13 The Design and Implementation of Protocol-Based Hidden Key Recovery
  15. Altmetric Badge
    Chapter 14 Intrinsic Limitations of Digital Signatures and How to Cope with Them
  16. Altmetric Badge
    Chapter 15 On the Security of Fair Non-repudiation Protocols
  17. Altmetric Badge
    Chapter 16 Security Analysis of a Password Authenticated Key Exchange Protocol
  18. Altmetric Badge
    Chapter 17 Zero-Value Point Attacks on Elliptic Curve Cryptosystem
  19. Altmetric Badge
    Chapter 18 Cryptanalysis of an Algebraic Privacy Homomorphism
  20. Altmetric Badge
    Chapter 19 Analysis of the Insecurity of ECMQV with Partially Known Nonces
  21. Altmetric Badge
    Chapter 20 Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES
  22. Altmetric Badge
    Chapter 21 A Note on Weak Keys of PES, IDEA, and Some Extended Variants
  23. Altmetric Badge
    Chapter 22 Foundations of Differential Cryptanalysis in Abelian Groups
  24. Altmetric Badge
    Chapter 23 Trust and Authorization in Pervasive B2E Scenarios
  25. Altmetric Badge
    Chapter 24 A Logic Model for Temporal Authorization Delegation with Negation
  26. Altmetric Badge
    Chapter 25 Zero-Distortion Authentication Watermarking
  27. Altmetric Badge
    Chapter 26 Designated Verification of Non-invertible Watermark
  28. Altmetric Badge
    Chapter 27 Proactive Software Tampering Detection
  29. Altmetric Badge
    Chapter 28 Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits
  30. Altmetric Badge
    Chapter 29 Towards a Business Process-Driven Framework for Security Engineering with the UML
  31. Altmetric Badge
    Chapter 30 Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes
  32. Altmetric Badge
    Chapter 31 Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations
  33. Altmetric Badge
    Chapter 32 Short c -Secure Fingerprinting Codes
  34. Altmetric Badge
    Chapter 33 The Role of Arbiters in Asymmetric Authentication Schemes
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent
wikipedia
3 Wikipedia pages

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
48 Mendeley