↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Optimal Bounds for Multi-Prime Φ-Hiding Assumption
  3. Altmetric Badge
    Chapter 2 Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
  4. Altmetric Badge
    Chapter 3 A Game-Theoretic Perspective on Oblivious Transfer
  5. Altmetric Badge
    Chapter 4 Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length
  6. Altmetric Badge
    Chapter 5 Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion
  7. Altmetric Badge
    Chapter 6 Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
  8. Altmetric Badge
    Chapter 7 Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia
  9. Altmetric Badge
    Chapter 8 Low Data Complexity Attack on Reduced Camellia-256
  10. Altmetric Badge
    Chapter 9 Cryptanalysis of RSA with a Small Parameter
  11. Altmetric Badge
    Chapter 10 An Algebraic Broadcast Attack against NTRU
  12. Altmetric Badge
    Chapter 11 Information Security and Privacy
  13. Altmetric Badge
    Chapter 12 Weimar-DM: A Highly Secure Double-Length Compression Function
  14. Altmetric Badge
    Chapter 13 An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
  15. Altmetric Badge
    Chapter 14 Zero-Knowledge Protocols for the McEliece Encryption
  16. Altmetric Badge
    Chapter 15 Information Security and Privacy
  17. Altmetric Badge
    Chapter 16 Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
  18. Altmetric Badge
    Chapter 17 How to Fix Two RSA-Based PVSS Schemes—Exploration and Solution
  19. Altmetric Badge
    Chapter 18 Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
  20. Altmetric Badge
    Chapter 19 Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes
  21. Altmetric Badge
    Chapter 20 A Short Non-delegatable Strong Designated Verifier Signature
  22. Altmetric Badge
    Chapter 21 Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures
  23. Altmetric Badge
    Chapter 22 Fully Leakage-Resilient Signatures with Auxiliary Inputs
  24. Altmetric Badge
    Chapter 23 Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
  25. Altmetric Badge
    Chapter 24 A Generic Construction of Accountable Decryption and Its Applications
  26. Altmetric Badge
    Chapter 25 Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
  27. Altmetric Badge
    Chapter 26 Information Security and Privacy
  28. Altmetric Badge
    Chapter 27 Anonymous ID-Based Proxy Re-Encryption
  29. Altmetric Badge
    Chapter 28 On the Optimality of Lattices for the Coppersmith Technique
  30. Altmetric Badge
    Chapter 29 Revocable Identity-Based Encryption from Lattices
  31. Altmetric Badge
    Chapter 30 On Area, Time, and the Right Trade-Off
  32. Altmetric Badge
    Chapter 31 Analysis of Xorrotation with Application to an HC-128 Variant
  33. Altmetric Badge
    Chapter 32 Private Fingerprint Matching
  34. Altmetric Badge
    Chapter 33 Information Security and Privacy
  35. Altmetric Badge
    Chapter 34 Information Security and Privacy
  36. Altmetric Badge
    Chapter 35 Non-malleable Instance-Dependent Commitment in the Standard Model
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Privacy
Published by
Springer Berlin Heidelberg, January 2012
DOI 10.1007/978-3-642-31448-3
ISBNs
978-3-64-231447-6, 978-3-64-231448-3
Editors

Susilo, Willy, Mu, Yi, Seberry, Jennifer

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 2 100%
Student > Bachelor 1 50%
Readers by discipline Count As %
Computer Science 2 100%
Economics, Econometrics and Finance 1 50%