↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields
  3. Altmetric Badge
    Chapter 2 Security Analysis and Improvement of the Global Key Recovery System
  4. Altmetric Badge
    Chapter 3 The LILI-II Keystream Generator
  5. Altmetric Badge
    Chapter 4 A Secure Re-keying Scheme with Key Recovery Property
  6. Altmetric Badge
    Chapter 5 Modelling Trust Structures for Public Key Infrastructures
  7. Altmetric Badge
    Chapter 6 Size of Broadcast in Threshold Schemes with Disenrollment
  8. Altmetric Badge
    Chapter 7 Requirements for Group Independent Linear Threshold Secret Sharing Schemes
  9. Altmetric Badge
    Chapter 8 Information Security and Privacy
  10. Altmetric Badge
    Chapter 9 Information Security and Privacy
  11. Altmetric Badge
    Chapter 10 Note on Fast Computation of Secret RSA Exponents
  12. Altmetric Badge
    Chapter 11 Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying
  13. Altmetric Badge
    Chapter 12 Cryptanalysis of Stream Cipher COS (2, 128) Mode I
  14. Altmetric Badge
    Chapter 13 The Analysis of Zheng-Seberry Scheme
  15. Altmetric Badge
    Chapter 14 Cryptanalysis of Stream Cipher Alpha1
  16. Altmetric Badge
    Chapter 15 A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
  17. Altmetric Badge
    Chapter 16 Isomorphism Classes of Hyperelliptic Curves of Genus 2 over \( \mathbb{F}_q \)
  18. Altmetric Badge
    Chapter 17 Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems
  19. Altmetric Badge
    Chapter 18 A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis
  20. Altmetric Badge
    Chapter 19 Strengthening the Key Schedule of the AES
  21. Altmetric Badge
    Chapter 20 On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes
  22. Altmetric Badge
    Chapter 21 Security Management: An Information Systems Setting
  23. Altmetric Badge
    Chapter 22 Resolving Conflicts in Authorization Delegations
  24. Altmetric Badge
    Chapter 23 Information Security and Privacy
  25. Altmetric Badge
    Chapter 24 Maintaining the Validity of Digital Signatures in B2B Applications
  26. Altmetric Badge
    Chapter 25 Short 3-Secure Fingerprinting Codes for Copyright Protection
  27. Altmetric Badge
    Chapter 26 An Order-Specified Multisignature Scheme Secure against Active Insider Attacks
  28. Altmetric Badge
    Chapter 27 Authenticated Operation of Open Computing Devices
  29. Altmetric Badge
    Chapter 28 A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
  30. Altmetric Badge
    Chapter 29 A Brief Outline of Research on Correlation Immune Functions
  31. Altmetric Badge
    Chapter 30 m out of n Oblivious Transfer
  32. Altmetric Badge
    Chapter 31 On the Security of Reduced Versions of 3-Pass HAVAL
  33. Altmetric Badge
    Chapter 32 On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling
  34. Altmetric Badge
    Chapter 33 On the Security of a Modified Paillier Public-Key Primitive
  35. Altmetric Badge
    Chapter 34 How to Play Sherlock Holmes in the World of Mobile Agents
  36. Altmetric Badge
    Chapter 35 A Practical Approach Defeating Blackmailing
  37. Altmetric Badge
    Chapter 36 Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
  38. Altmetric Badge
    Chapter 37 Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
wikipedia
3 Wikipedia pages

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
13 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Privacy
Published by
Springer Berlin Heidelberg, January 2002
DOI 10.1007/3-540-45450-0
ISBNs
978-3-54-043861-8, 978-3-54-045450-2
Editors

Lynn Batten, Jennifer Seberry

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 13 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 13 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 1 8%
Unknown 12 92%
Readers by discipline Count As %
Business, Management and Accounting 1 8%
Unknown 12 92%