↓ Skip to main content

Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings

Overview of attention for book
Cover of 'Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Dynamic Mechanism for Recovering from Buffer Overflow Attacks
  3. Altmetric Badge
    Chapter 2 SVision: A Network Host-Centered Anomaly Visualization Technique
  4. Altmetric Badge
    Chapter 3 Time-Based Release of Confidential Information in Hierarchical Settings
  5. Altmetric Badge
    Chapter 4 “Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery System Experience
  6. Altmetric Badge
    Chapter 5 A Privacy Preserving Rental System
  7. Altmetric Badge
    Chapter 6 Constant Round Dynamic Group Key Agreement
  8. Altmetric Badge
    Chapter 7 A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design
  9. Altmetric Badge
    Chapter 8 ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms
  10. Altmetric Badge
    Chapter 9 On the Notion of Statistical Security in Simulatability Definitions
  11. Altmetric Badge
    Chapter 10 Certificateless Public Key Encryption Without Pairing
  12. Altmetric Badge
    Chapter 11 Tracing-by-Linking Group Signatures
  13. Altmetric Badge
    Chapter 12 Chaum’s Designated Confirmer Signature Revisited
  14. Altmetric Badge
    Chapter 13 gore : Routing-Assisted Defense Against DDoS Attacks
  15. Altmetric Badge
    Chapter 14 IPSec Support in NAT-PT Scenario for IPv6 Transition
  16. Altmetric Badge
    Chapter 15 Hybrid Signcryption Schemes with Outsider Security
  17. Altmetric Badge
    Chapter 16 Analysis and Improvement of a Signcryption Scheme with Key Privacy
  18. Altmetric Badge
    Chapter 17 Efficient and Proactive Threshold Signcryption
  19. Altmetric Badge
    Chapter 18 Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
  20. Altmetric Badge
    Chapter 19 Hardware Architecture and Cost Estimates for Breaking SHA-1
  21. Altmetric Badge
    Chapter 20 On the Security of Tweakable Modes of Operation: TBC and TAE
  22. Altmetric Badge
    Chapter 21 A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm
  23. Altmetric Badge
    Chapter 22 Compatible Ideal Contrast Visual Cryptography Schemes with Reversing
  24. Altmetric Badge
    Chapter 23 An Oblivious Transfer Protocol with Log-Squared Communication
  25. Altmetric Badge
    Chapter 24 Electronic Voting: Starting Over?
  26. Altmetric Badge
    Chapter 25 Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System
  27. Altmetric Badge
    Chapter 26 Universally Composable Time-Stamping Schemes with Audit
  28. Altmetric Badge
    Chapter 27 A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption
  29. Altmetric Badge
    Chapter 28 Building a Cryptovirus Using Microsoft’s Cryptographic API
  30. Altmetric Badge
    Chapter 29 On the Security of the WinRAR Encryption Method
  31. Altmetric Badge
    Chapter 30 Towards Better Software Tamper Resistance
  32. Altmetric Badge
    Chapter 31 Device-Enabled Authorization in the Grey System
  33. Altmetric Badge
    Chapter 32 Evaluating Access Control Policies Through Model Checking
  34. Altmetric Badge
    Chapter 33 A Cryptographic Solution for General Access Control
  35. Altmetric Badge
    Chapter 34 Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting
  36. Altmetric Badge
    Chapter 35 A Formal Definition for Trust in Distributed Systems
  37. Altmetric Badge
    Chapter 36 A Practical Voting Scheme with Receipts
  38. Altmetric Badge
    Chapter 37 New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation
  39. Altmetric Badge
    Chapter 38 Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models
Attention for Chapter 23: An Oblivious Transfer Protocol with Log-Squared Communication
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age and source

Mentioned by

wikipedia
2 Wikipedia pages

Citations

dimensions_citation
11 Dimensions

Readers on

mendeley
59 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
An Oblivious Transfer Protocol with Log-Squared Communication
Chapter number 23
Book title
Information Security
Published in
Lecture notes in computer science, September 2005
DOI 10.1007/11556992_23
Book ISBNs
978-3-54-029001-8, 978-3-54-031930-6
Authors

Helger Lipmaa, Lipmaa, Helger

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 59 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Switzerland 1 2%
France 1 2%
Italy 1 2%
Sweden 1 2%
Canada 1 2%
Estonia 1 2%
Russia 1 2%
United States 1 2%
Unknown 51 86%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 13 22%
Student > Master 13 22%
Researcher 9 15%
Professor > Associate Professor 5 8%
Lecturer 4 7%
Other 13 22%
Unknown 2 3%
Readers by discipline Count As %
Computer Science 49 83%
Mathematics 5 8%
Engineering 2 3%
Physics and Astronomy 1 2%
Unknown 2 3%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 23 March 2022.
All research outputs
#7,692,405
of 23,400,864 outputs
Outputs from Lecture notes in computer science
#2,493
of 8,155 outputs
Outputs of similar age
#20,922
of 59,791 outputs
Outputs of similar age from Lecture notes in computer science
#8
of 54 outputs
Altmetric has tracked 23,400,864 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,155 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has gotten more attention than average, scoring higher than 54% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 59,791 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 14th percentile – i.e., 14% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 54 others from the same source and published within six weeks on either side of this one. This one is in the 35th percentile – i.e., 35% of its contemporaries scored the same or lower than it.