↓ Skip to main content

Computer Security

Overview of attention for book
Cover of 'Computer Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Workflow-Aware Security of Integrated Mobility Services
  3. Altmetric Badge
    Chapter 2 Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning
  4. Altmetric Badge
    Chapter 3 PIAnalyzer: A Precise Approach for PendingIntent Vulnerability Analysis
  5. Altmetric Badge
    Chapter 4 Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android Applications
  6. Altmetric Badge
    Chapter 5 Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database
  7. Altmetric Badge
    Chapter 6 Order-Revealing Encryption: File-Injection Attack and Forward Security
  8. Altmetric Badge
    Chapter 7 SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks
  9. Altmetric Badge
    Chapter 8 Detecting and Characterizing Web Bot Traffic in a Large E-commerce Marketplace
  10. Altmetric Badge
    Chapter 9 Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases
  11. Altmetric Badge
    Chapter 10 Efficient and Secure Outsourcing of Differentially Private Data Publication
  12. Altmetric Badge
    Chapter 11 Symmetric Searchable Encryption with Sharing and Unsharing
  13. Altmetric Badge
    Chapter 12 Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security
  14. Altmetric Badge
    Chapter 13 Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
  15. Altmetric Badge
    Chapter 14 Scalable Wildcarded Identity-Based Encryption
  16. Altmetric Badge
    Chapter 15 Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption
  17. Altmetric Badge
    Chapter 16 RiffleScrambler – A Memory-Hard Password Storing Function
  18. Altmetric Badge
    Chapter 17 Practical Strategy-Resistant Privacy-Preserving Elections
  19. Altmetric Badge
    Chapter 18 Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker
  20. Altmetric Badge
    Chapter 19 Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies
  21. Altmetric Badge
    Chapter 20 Constant-Round Client-Aided Secure Comparison Protocol
  22. Altmetric Badge
    Chapter 21 Towards Practical RAM Based Secure Computation
  23. Altmetric Badge
    Chapter 22 Improved Signature Schemes for Secure Multi-party Computation with Certified Inputs
  24. Altmetric Badge
    Chapter 23 Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks
  25. Altmetric Badge
    Chapter 24 Trust Anchors in Software Defined Networks
  26. Altmetric Badge
    Chapter 25 Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls—Secure and Efficient Fine-Grained Access Control on Corrupted Machines
  27. Altmetric Badge
    Chapter 26 Making Any Attribute-Based Encryption Accountable, Efficiently
  28. Altmetric Badge
    Chapter 27 Decentralized Policy-Hiding ABE with Receiver Privacy
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
25 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computer Security
Published by
Springer International Publishing, October 2018
DOI 10.1007/978-3-319-98989-1
ISBNs
978-3-31-998988-4, 978-3-31-998989-1
Editors

Lopez, Javier, Zhou, Jianying, Soriano, Miguel

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 25 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 25 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 6 24%
Student > Ph. D. Student 3 12%
Student > Master 3 12%
Lecturer 2 8%
Student > Doctoral Student 1 4%
Other 1 4%
Unknown 9 36%
Readers by discipline Count As %
Computer Science 12 48%
Business, Management and Accounting 1 4%
Social Sciences 1 4%
Engineering 1 4%
Unknown 10 40%