↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Algebraic Attacks on Clock-Controlled Stream Ciphers
  3. Altmetric Badge
    Chapter 2 Cache Based Power Analysis Attacks on AES
  4. Altmetric Badge
    Chapter 3 Distinguishing Attack on SOBER-128 with Linear Masking
  5. Altmetric Badge
    Chapter 4 Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks
  6. Altmetric Badge
    Chapter 5 Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond
  7. Altmetric Badge
    Chapter 6 Improved Cryptanalysis of MAG
  8. Altmetric Badge
    Chapter 7 On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
  9. Altmetric Badge
    Chapter 8 Augmented Certificate Revocation Lists
  10. Altmetric Badge
    Chapter 9 Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
  11. Altmetric Badge
    Chapter 10 Towards an Invisible Honeypot Monitoring System
  12. Altmetric Badge
    Chapter 11 Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service
  13. Altmetric Badge
    Chapter 12 Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages
  14. Altmetric Badge
    Chapter 13 More on Stand-Alone and Setup-Free Verifiably Committed Signatures
  15. Altmetric Badge
    Chapter 14 API Monitoring System for Defeating Worms and Exploits in MS-Windows System
  16. Altmetric Badge
    Chapter 15 Hiding Circuit Topology from Unbounded Reverse Engineers
  17. Altmetric Badge
    Chapter 16 The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications
  18. Altmetric Badge
    Chapter 17 Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
  19. Altmetric Badge
    Chapter 18 Efficient Identity-Based Signatures Secure in the Standard Model
  20. Altmetric Badge
    Chapter 19 Event-Oriented k-Times Revocable-iff-Linked Group Signatures
  21. Altmetric Badge
    Chapter 20 Key Replacement Attack Against a Generic Construction of Certificateless Signature
  22. Altmetric Badge
    Chapter 21 A Novel Range Test
  23. Altmetric Badge
    Chapter 22 Efficient Primitives from Exponentiation in ℤ p
  24. Altmetric Badge
    Chapter 23 PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
  25. Altmetric Badge
    Chapter 24 Statistical Decoding Revisited
  26. Altmetric Badge
    Chapter 25 Towards Provable Security for Ubiquitous Applications
  27. Altmetric Badge
    Chapter 26 Oblivious Scalar-Product Protocols
  28. Altmetric Badge
    Chapter 27 On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases
  29. Altmetric Badge
    Chapter 28 Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
  30. Altmetric Badge
    Chapter 29 Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
  31. Altmetric Badge
    Chapter 30 Tag-KEM from Set Partial Domain One-Way Permutations
  32. Altmetric Badge
    Chapter 31 Information Security and Privacy
  33. Altmetric Badge
    Chapter 32 Graphical Representation of Authorization Policies for Weighted Credentials
  34. Altmetric Badge
    Chapter 33 Secure Cross-Realm C2C-PAKE Protocol
  35. Altmetric Badge
    Chapter 34 Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction
  36. Altmetric Badge
    Chapter 35 Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant
  37. Altmetric Badge
    Chapter 36 Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
Attention for Chapter 10: Towards an Invisible Honeypot Monitoring System
Altmetric Badge

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
30 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Towards an Invisible Honeypot Monitoring System
Chapter number 10
Book title
Information Security and Privacy
Published by
Springer, Berlin, Heidelberg, July 2006
DOI 10.1007/11780656_10
Book ISBNs
978-3-54-035458-1, 978-3-54-035459-8
Authors

Nguyen Anh Quynh, Yoshiyasu Takefuji

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 30 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Malaysia 1 3%
Pakistan 1 3%
Germany 1 3%
Unknown 27 90%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 33%
Student > Master 5 17%
Professor 4 13%
Researcher 2 7%
Student > Bachelor 1 3%
Other 5 17%
Unknown 3 10%
Readers by discipline Count As %
Computer Science 24 80%
Physics and Astronomy 1 3%
Unknown 5 17%