↓ Skip to main content

Computer and Network Security Essentials

Overview of attention for book
Cover of 'Computer and Network Security Essentials'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Computer Security
  3. Altmetric Badge
    Chapter 2 A Survey and Taxonomy of Classifiers of Intrusion Detection Systems
  4. Altmetric Badge
    Chapter 3 A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics
  5. Altmetric Badge
    Chapter 4 Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining
  6. Altmetric Badge
    Chapter 5 A Postmortem Forensic Analysis for a JavaScript Based Attack
  7. Altmetric Badge
    Chapter 6 Malleable Cryptosystems and Their Applications in Wireless Sensor Networks
  8. Altmetric Badge
    Chapter 7 A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems
  9. Altmetric Badge
    Chapter 8 Security Protocols for Networks and Internet: A Global Vision
  10. Altmetric Badge
    Chapter 9 Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls
  11. Altmetric Badge
    Chapter 10 Reliable Transmission Protocol for Underwater Acoustic Networks
  12. Altmetric Badge
    Chapter 11 Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield
  13. Altmetric Badge
    Chapter 12 Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study
  14. Altmetric Badge
    Chapter 13 Searching Encrypted Data on the Cloud
  15. Altmetric Badge
    Chapter 14 A Strong Single Sign-on User Authentication Scheme Using Mobile Token Without Verifier Table for Cloud Based Services
  16. Altmetric Badge
    Chapter 15 Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers
  17. Altmetric Badge
    Chapter 16 Secure Elliptic Curves in Cryptography
  18. Altmetric Badge
    Chapter 17 Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis
  19. Altmetric Badge
    Chapter 18 Biometric Systems for User Authentication
  20. Altmetric Badge
    Chapter 19 Biometric Authentication and Data Security in Cloud Computing
  21. Altmetric Badge
    Chapter 20 Approximate Search in Digital Forensics
  22. Altmetric Badge
    Chapter 21 Privacy Preserving Internet Browsers: Forensic Analysis of Browzar
  23. Altmetric Badge
    Chapter 22 Experimental Digital Forensics of Subscriber Identification Module (SIM) Card
  24. Altmetric Badge
    Chapter 23 A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks
  25. Altmetric Badge
    Chapter 24 Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs
  26. Altmetric Badge
    Chapter 25 Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
  27. Altmetric Badge
    Chapter 26 On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns
  28. Altmetric Badge
    Chapter 27 Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment
  29. Altmetric Badge
    Chapter 28 Securing the Internet of Things: Best Practices for Deploying IoT Devices
  30. Altmetric Badge
    Chapter 29 Cognitive Computing and Multiscale Analysis for Cyber Security
  31. Altmetric Badge
    Chapter 30 A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems
  32. Altmetric Badge
    Chapter 31 Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts
  33. Altmetric Badge
    Chapter 32 A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems
  34. Altmetric Badge
    Chapter 33 Accountability for Federated Clouds
  35. Altmetric Badge
    Chapter 34 A Cognitive and Concurrent Cyber Kill Chain Model
  36. Altmetric Badge
    Chapter 35 Defense Methods Against Social Engineering Attacks
Attention for Chapter 6: Malleable Cryptosystems and Their Applications in Wireless Sensor Networks
Altmetric Badge

Citations

dimensions_citation
23 Dimensions

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Malleable Cryptosystems and Their Applications in Wireless Sensor Networks
Chapter number 6
Book title
Computer and Network Security Essentials
Published by
Springer, Cham, August 2017
DOI 10.1007/978-3-319-58424-9_6
Book ISBNs
978-3-31-958423-2, 978-3-31-958424-9
Authors

Keyur Parmar, Devesh C. Jinwala

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 1 33%
Other 1 33%
Lecturer > Senior Lecturer 1 33%
Readers by discipline Count As %
Computer Science 2 67%
Unknown 1 33%