↓ Skip to main content

Information security and cryptology - ICISC 2006 : 9th international conference, Busan, Korea, November 30 - December 1, 2006 ; proceedings

Overview of attention for book
Cover of 'Information security and cryptology - ICISC 2006 : 9th international conference, Busan, Korea, November 30 - December 1, 2006 ; proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 RFID Privacy Based on Public-Key Cryptography
  3. Altmetric Badge
    Chapter 2 Generic Attacks on Symmetric Ciphers
  4. Altmetric Badge
    Chapter 3 Improved Collision Attack on the Hash Function Proposed at PKC’98
  5. Altmetric Badge
    Chapter 4 Hashing with Polynomials
  6. Altmetric Badge
    Chapter 5 Birthday Paradox for Multi-collisions
  7. Altmetric Badge
    Chapter 6 New Variant of the Self-Shrinking Generator and Its Cryptographic Properties
  8. Altmetric Badge
    Chapter 7 On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher
  9. Altmetric Badge
    Chapter 8 On Algebraic Immunity and Annihilators
  10. Altmetric Badge
    Chapter 9 High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem
  11. Altmetric Badge
    Chapter 10 A High-Speed Square Root Algorithm in Extension Fields
  12. Altmetric Badge
    Chapter 11 The Smallest ARIA Module with 16-Bit Architecture
  13. Altmetric Badge
    Chapter 12 A Simpler Sieving Device: Combining ECM and TWIRL
  14. Altmetric Badge
    Chapter 13 Information Security and Cryptology – ICISC 2006
  15. Altmetric Badge
    Chapter 14 A Time-Frame Based Trust Model for P2P Systems
  16. Altmetric Badge
    Chapter 15 Spatial Context in Role-Based Access Control
  17. Altmetric Badge
    Chapter 16 An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks
  18. Altmetric Badge
    Chapter 17 Mobile RFID Applications and Security Challenges
  19. Altmetric Badge
    Chapter 18 An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time
  20. Altmetric Badge
    Chapter 19 A Copy Protection Technique Using Multi-level Error Coding
  21. Altmetric Badge
    Chapter 20 Digital Rights Management with Right Delegation for Home Networks
  22. Altmetric Badge
    Chapter 21 Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM
  23. Altmetric Badge
    Chapter 22 Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction
  24. Altmetric Badge
    Chapter 23 Cryptanalysis of T-Function-Based Hash Functions
  25. Altmetric Badge
    Chapter 24 Collision Search Attack for 53-Step HAS-160
  26. Altmetric Badge
    Chapter 25 Klein Bottle Routing: An Alternative to Onion Routing and Mix Network
  27. Altmetric Badge
    Chapter 26 New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
  28. Altmetric Badge
    Chapter 27 A New Proxy Signature Scheme Providing Self-delegation
  29. Altmetric Badge
    Chapter 28 Extended Sanitizable Signatures
Attention for Chapter 14: A Time-Frame Based Trust Model for P2P Systems
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
30 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A Time-Frame Based Trust Model for P2P Systems
Chapter number 14
Book title
Information Security and Cryptology – ICISC 2006
Published by
Springer, Berlin, Heidelberg, November 2006
DOI 10.1007/11927587_14
Book ISBNs
978-3-54-049112-5, 978-3-54-049114-9
Authors

Junsheng Chang, Huaimin Wang, Gang Yin

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 30 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 30 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 33%
Student > Master 5 17%
Researcher 4 13%
Professor 3 10%
Student > Postgraduate 2 7%
Other 3 10%
Unknown 3 10%
Readers by discipline Count As %
Computer Science 23 77%
Business, Management and Accounting 1 3%
Mathematics 1 3%
Psychology 1 3%
Physics and Astronomy 1 3%
Other 0 0%
Unknown 3 10%