↓ Skip to main content

Information Security Practice and Experience

Overview of attention for book
Cover of 'Information Security Practice and Experience'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Risk Assessment of Production Networks Using Honeynets – Some Practical Experience
  3. Altmetric Badge
    Chapter 2 POSSET – Policy-Driven Secure Session Transfer
  4. Altmetric Badge
    Chapter 3 Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach
  5. Altmetric Badge
    Chapter 4 Robust Routing in Malicious Environment for Ad Hoc Networks
  6. Altmetric Badge
    Chapter 5 Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation
  7. Altmetric Badge
    Chapter 6 Tracing Traitors by Guessing Secrets. The q -Ary Case
  8. Altmetric Badge
    Chapter 7 Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications
  9. Altmetric Badge
    Chapter 8 Countermeasures for Preventing Comb Method Against SCA Attacks
  10. Altmetric Badge
    Chapter 9 An Email Worm Vaccine Architecture
  11. Altmetric Badge
    Chapter 10 Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model
  12. Altmetric Badge
    Chapter 11 Security On-demand Architecture with Multiple Modules Support
  13. Altmetric Badge
    Chapter 12 Measuring Resistance to Social Engineering
  14. Altmetric Badge
    Chapter 13 Conformance Checking of RBAC Policy and its Implementation
  15. Altmetric Badge
    Chapter 14 A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications
  16. Altmetric Badge
    Chapter 15 A Task-Oriented Access Control Model for WfMS
  17. Altmetric Badge
    Chapter 16 A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection
  18. Altmetric Badge
    Chapter 17 Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks
  19. Altmetric Badge
    Chapter 18 Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures
  20. Altmetric Badge
    Chapter 19 Model Redundancy vs. Intrusion Detection
  21. Altmetric Badge
    Chapter 20 An Open Approach for Designing Secure Electronic Immobilizers
  22. Altmetric Badge
    Chapter 21 An Empirical Study on the Usability of Logout in a Single Sign-on System
  23. Altmetric Badge
    Chapter 22 Secure Software Delivery and Installation in Embedded Systems
  24. Altmetric Badge
    Chapter 23 A Restricted Multi-show Credential System and Its Application on E-Voting
  25. Altmetric Badge
    Chapter 24 Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks
  26. Altmetric Badge
    Chapter 25 Using Trust for Restricted Delegation in Grid Environments
  27. Altmetric Badge
    Chapter 26 Computer Vulnerability Evaluation Using Fault Tree Analysis
  28. Altmetric Badge
    Chapter 27 An Identity-Based Grid Security Infrastructure Model
  29. Altmetric Badge
    Chapter 28 Towards Multilateral-Secure DRM Platforms
  30. Altmetric Badge
    Chapter 29 Hiding Data in Binary Images
  31. Altmetric Badge
    Chapter 30 Performance Analysis of CDMA-Based Watermarking with Quantization Scheme
  32. Altmetric Badge
    Chapter 31 Protecting Mass Data Basing on Small Trusted Agent
  33. Altmetric Badge
    Chapter 32 On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
  34. Altmetric Badge
    Chapter 33 Token-Controlled Public Key Encryption
  35. Altmetric Badge
    Chapter 34 A New Class of Codes for Fingerprinting Schemes
  36. Altmetric Badge
    Chapter 35 t -Out-of- n String/Bit Oblivious Transfers Revisited
Attention for Chapter 6: Tracing Traitors by Guessing Secrets. The q -Ary Case
Altmetric Badge

Readers on

mendeley
9 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Tracing Traitors by Guessing Secrets. The q -Ary Case
Chapter number 6
Book title
Information Security Practice and Experience
Published by
Springer, Berlin, Heidelberg, April 2005
DOI 10.1007/978-3-540-31979-5_6
Book ISBNs
978-3-54-025584-0, 978-3-54-031979-5
Authors

Marcel Fernandez, Miguel Soriano, Josep Cotrina

Mendeley readers

The data shown below were compiled from readership statistics for 9 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 9 100%

Demographic breakdown

Readers by professional status Count As %
Professor 1 11%
Student > Ph. D. Student 1 11%
Other 1 11%
Unknown 6 67%
Readers by discipline Count As %
Computer Science 2 22%
Engineering 1 11%
Unknown 6 67%