↓ Skip to main content

Security and Cryptography for Networks : 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

Overview of attention for book
Cover of 'Security and Cryptography for Networks : 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Universally Composable Non-Interactive Key Exchange
  3. Altmetric Badge
    Chapter 2 Forward Secure Non-Interactive Key Exchange
  4. Altmetric Badge
    Chapter 3 Secure Key Exchange and Sessions without Credentials
  5. Altmetric Badge
    Chapter 4 Relaxed Two-to-One Recoding Schemes
  6. Altmetric Badge
    Chapter 5 Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security)
  7. Altmetric Badge
    Chapter 6 Program Obfuscation via Multilinear Maps
  8. Altmetric Badge
    Chapter 7 Constrained Verifiable Random Functions
  9. Altmetric Badge
    Chapter 8 Publicly Evaluable Pseudorandom Functions and Their Applications
  10. Altmetric Badge
    Chapter 9 On the Classification of Finite Boolean Functions up to Fairness
  11. Altmetric Badge
    Chapter 10 Communication-Efficient MPC for General Adversary Structures
  12. Altmetric Badge
    Chapter 11 Publicly Auditable Secure Multi-Party Computation
  13. Altmetric Badge
    Chapter 12 Reducing the Overhead of MPC over a Large Population
  14. Altmetric Badge
    Chapter 13 Statistics on Password Re-use and Adaptive Strength for Financial Accounts
  15. Altmetric Badge
    Chapter 14 Efficient Network-Based Enforcement of Data Access Rights
  16. Altmetric Badge
    Chapter 15 EyeDecrypt — Private Interactions in Plain Sight
  17. Altmetric Badge
    Chapter 16 Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
  18. Altmetric Badge
    Chapter 17 Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
  19. Altmetric Badge
    Chapter 18 Functional Encryption and Its Impact on Cryptography
  20. Altmetric Badge
    Chapter 19 Generic Attacks on Strengthened HMAC: n -bit Secure HMAC Requires Key in All Blocks
  21. Altmetric Badge
    Chapter 20 Improved Indifferentiable Security Analysis of PHOTON
  22. Altmetric Badge
    Chapter 21 Faster Maliciously Secure Two-Party Computation Using the GPU
  23. Altmetric Badge
    Chapter 22 Systematizing Secure Computation for Research and Decision Support
  24. Altmetric Badge
    Chapter 23 An Empirical Study and Some Improvements of the MiniMac Protocol for Secure Computation
  25. Altmetric Badge
    Chapter 24 Efficient NIZK Arguments via Parallel Verification of Benes Networks
  26. Altmetric Badge
    Chapter 25 Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
  27. Altmetric Badge
    Chapter 26 On Adaptively Secure Protocols
  28. Altmetric Badge
    Chapter 27 Key-Indistinguishable Message Authentication Codes
  29. Altmetric Badge
    Chapter 28 Interactive Encryption and Message Authentication
  30. Altmetric Badge
    Chapter 29 Homomorphic Signatures and Message Authentication Codes
  31. Altmetric Badge
    Chapter 30 Efficient Proofs of Secure Erasure
  32. Altmetric Badge
    Chapter 31 Security and Cryptography for Networks
  33. Altmetric Badge
    Chapter 32 Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
  34. Altmetric Badge
    Chapter 33 On Selective-Opening Attacks against Encryption Schemes
  35. Altmetric Badge
    Chapter 34 Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
Attention for Chapter 30: Efficient Proofs of Secure Erasure
Altmetric Badge

Mentioned by

twitter
1 tweeter
patent
2 patents
wikipedia
1 Wikipedia page

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
15 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Efficient Proofs of Secure Erasure
Chapter number 30
Book title
Security and Cryptography for Networks
Published by
Springer, Cham, September 2014
DOI 10.1007/978-3-319-10879-7_30
Book ISBNs
978-3-31-910878-0, 978-3-31-910879-7
Authors

Nikolaos P. Karvelas, Aggelos Kiayias

Twitter Demographics

The data shown below were collected from the profile of 1 tweeter who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 15 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 15 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 4 27%
Student > Master 3 20%
Other 2 13%
Student > Bachelor 2 13%
Professor 1 7%
Other 2 13%
Unknown 1 7%
Readers by discipline Count As %
Computer Science 13 87%
Engineering 1 7%
Unknown 1 7%