↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
  3. Altmetric Badge
    Chapter 2 Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting
  4. Altmetric Badge
    Chapter 3 Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files
  5. Altmetric Badge
    Chapter 4 Witness Encryption from Smooth Projective Hashing System
  6. Altmetric Badge
    Chapter 5 More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
  7. Altmetric Badge
    Chapter 6 QUIC Protocol with Post-quantum Authentication
  8. Altmetric Badge
    Chapter 7 Batched Fully Homomorphic Encryption from TFHE
  9. Altmetric Badge
    Chapter 8 Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization
  10. Altmetric Badge
    Chapter 9 Further Cryptanalysis of a Type of RSA Variants
  11. Altmetric Badge
    Chapter 10 The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64
  12. Altmetric Badge
    Chapter 11 Efficient Scalar Multiplication on Koblitz Curves with Pre-computation
  13. Altmetric Badge
    Chapter 12 Efficient ECDSA-Based Adaptor Signature for Batched Atomic Swaps
  14. Altmetric Badge
    Chapter 13 Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization
  15. Altmetric Badge
    Chapter 14 GRUZ: Practical Resource Fair Exchange Without Blockchain
  16. Altmetric Badge
    Chapter 15 Daric: A Storage Efficient Payment Channel with Punishment Mechanism
  17. Altmetric Badge
    Chapter 16 A Blockchain-Based Mutual Authentication Protocol for Smart Home
  18. Altmetric Badge
    Chapter 17 OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control
  19. Altmetric Badge
    Chapter 18 EarlyCrow : Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries
  20. Altmetric Badge
    Chapter 19 ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence
  21. Altmetric Badge
    Chapter 20 Dissecting Applications Uninstallers and Removers: Are They Effective?
  22. Altmetric Badge
    Chapter 21 Representing LLVM-IR in a Code Property Graph
  23. Altmetric Badge
    Chapter 22 Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security
  24. Altmetric Badge
    Chapter 23 Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay
  25. Altmetric Badge
    Chapter 24 AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition
  26. Altmetric Badge
    Chapter 25 HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud
  27. Altmetric Badge
    Chapter 26 Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64
  28. Altmetric Badge
    Chapter 27 CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks
  29. Altmetric Badge
    Chapter 28 Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing
  30. Altmetric Badge
    Chapter 29 Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
5 X users
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security
Published by
Springer International Publishing, December 2022
DOI 10.1007/978-3-031-22390-7
ISBNs
978-3-03-122389-1, 978-3-03-122390-7
Editors

Susilo, Willy, Chen, Xiaofeng, Guo, Fuchun, Zhang, Yudi, Intan, Rolly

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.