↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On the Broadcast and Validity-Checking Security of pkcs #1 v1.5 Encryption
  3. Altmetric Badge
    Chapter 2 How to Construct Interval Encryption from Binary Tree Encryption
  4. Altmetric Badge
    Chapter 3 Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
  5. Altmetric Badge
    Chapter 4 Trapdoor Sanitizable Signatures Made Easy
  6. Altmetric Badge
    Chapter 5 Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
  7. Altmetric Badge
    Chapter 6 Redactable Signatures for Tree-Structured Data: Definitions and Constructions
  8. Altmetric Badge
    Chapter 7 Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions
  9. Altmetric Badge
    Chapter 8 Multi-trail Statistical Saturation Attacks
  10. Altmetric Badge
    Chapter 9 Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G  ⊕ 
  11. Altmetric Badge
    Chapter 10 High Performance GHASH Function for Long Messages
  12. Altmetric Badge
    Chapter 11 Principles on the Security of AES against First and Second-Order Differential Power Analysis
  13. Altmetric Badge
    Chapter 12 Adaptive Chosen-Message Side-Channel Attacks
  14. Altmetric Badge
    Chapter 13 Secure Multiplicative Masking of Power Functions
  15. Altmetric Badge
    Chapter 14 Batch Groth–Sahai
  16. Altmetric Badge
    Chapter 15 Efficient and Secure Evaluation of Multivariate Polynomials and Applications
  17. Altmetric Badge
    Chapter 16 Efficient Implementation of the Orlandi Protocol
  18. Altmetric Badge
    Chapter 17 Improving the Round Complexity of Traitor Tracing Schemes
  19. Altmetric Badge
    Chapter 18 Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters
  20. Altmetric Badge
    Chapter 19 Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
  21. Altmetric Badge
    Chapter 20 Deniable Internet Key Exchange
  22. Altmetric Badge
    Chapter 21 A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
  23. Altmetric Badge
    Chapter 22 Secure Sketch for Multiple Secrets
  24. Altmetric Badge
    Chapter 23 A Message Recognition Protocol Based on Standard Assumptions
  25. Altmetric Badge
    Chapter 24 Affiliation-Hiding Key Exchange with Untrusted Group Authorities
  26. Altmetric Badge
    Chapter 25 Privacy-Preserving Group Discovery with Linear Complexity
  27. Altmetric Badge
    Chapter 26 Two New Efficient PIR-Writing Protocols
  28. Altmetric Badge
    Chapter 27 Regulatory Compliant Oblivious RAM
  29. Altmetric Badge
    Chapter 28 Revisiting Unpredictability-Based RFID Privacy Models
  30. Altmetric Badge
    Chapter 29 On RFID Privacy with Mutual Authentication and Tag Corruption
  31. Altmetric Badge
    Chapter 30 Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
  32. Altmetric Badge
    Chapter 31 COP: A Step toward Children Online Privacy
  33. Altmetric Badge
    Chapter 32 A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (90th percentile)
  • High Attention Score compared to outputs of the same age and source (95th percentile)

Mentioned by

news
1 news outlet
twitter
1 X user
patent
2 patents

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
ADS, June 2010
DOI 10.1007/978-3-642-13708-2
ISBNs
978-3-64-213707-5, 978-3-64-213708-2
Editors

Zhou, Jianying, Yung, Moti, Zhou, Jianying, Yung, Moti

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 2 100%
Student > Doctoral Student 1 50%
Readers by discipline Count As %
Linguistics 1 50%
Computer Science 1 50%
Medicine and Dentistry 1 50%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 13. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 05 August 2022.
All research outputs
#2,447,647
of 23,033,713 outputs
Outputs from ADS
#1,504
of 37,458 outputs
Outputs of similar age
#9,104
of 94,526 outputs
Outputs of similar age from ADS
#13
of 300 outputs
Altmetric has tracked 23,033,713 research outputs across all sources so far. Compared to these this one has done well and is in the 89th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 37,458 research outputs from this source. They receive a mean Attention Score of 4.6. This one has done particularly well, scoring higher than 95% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 94,526 tracked outputs that were published within six weeks on either side of this one in any source. This one has done particularly well, scoring higher than 90% of its contemporaries.
We're also able to compare this research output to 300 others from the same source and published within six weeks on either side of this one. This one has done particularly well, scoring higher than 95% of its contemporaries.