↓ Skip to main content

Information Security and Cryptology - ICISC 2005

Overview of attention for book
Cover of 'Information Security and Cryptology - ICISC 2005'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 National Security, Forensics and Mobile Communications
  3. Altmetric Badge
    Chapter 2 Information Security as Interdisciplinary Science Based on Ethics
  4. Altmetric Badge
    Chapter 3 A Timed-Release Key Management Scheme for Backward Recovery
  5. Altmetric Badge
    Chapter 4 Property-Based Broadcast Encryption for Multi-level Security Policies
  6. Altmetric Badge
    Chapter 5 Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption
  7. Altmetric Badge
    Chapter 6 An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image
  8. Altmetric Badge
    Chapter 7 Trust Management for Resilient Wireless Sensor Networks
  9. Altmetric Badge
    Chapter 8 Improvements to Mitchell’s Remote User Authentication Protocol
  10. Altmetric Badge
    Chapter 9 Efficient Authenticators with Application to Key Exchange
  11. Altmetric Badge
    Chapter 10 Benes and Butterfly Schemes Revisited
  12. Altmetric Badge
    Chapter 11 Relative Doubling Attack Against Montgomery Ladder
  13. Altmetric Badge
    Chapter 12 Improved Collision Attack on MD4 with Probability Almost 1
  14. Altmetric Badge
    Chapter 13 Finding Collision on 45-Step HAS-160
  15. Altmetric Badge
    Chapter 14 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks
  16. Altmetric Badge
    Chapter 15 The Dilemma of Covert Channels Searching
  17. Altmetric Badge
    Chapter 16 A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks
  18. Altmetric Badge
    Chapter 17 Foundations of Attack Trees
  19. Altmetric Badge
    Chapter 18 An Algebraic Masking Method to Protect AES Against Power Attacks
  20. Altmetric Badge
    Chapter 19 Characterisations of Extended Resiliency and Extended Immunity of S-Boxes
  21. Altmetric Badge
    Chapter 20 Integral Cryptanalysis of Reduced FOX Block Cipher
  22. Altmetric Badge
    Chapter 21 Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components
  23. Altmetric Badge
    Chapter 22 Cryptanalysis of Sfinks
  24. Altmetric Badge
    Chapter 23 Weaknesses of COSvd (2,128) Stream Cipher
  25. Altmetric Badge
    Chapter 24 Expanding Weak PRF with Small Key Size
  26. Altmetric Badge
    Chapter 25 On Linear Systems of Equations with Distinct Variables and Small Block Size
  27. Altmetric Badge
    Chapter 26 An FPGA Implementation of CCM Mode Using AES
  28. Altmetric Badge
    Chapter 27 New Architecture for Multiplication in GF (2 m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography
  29. Altmetric Badge
    Chapter 28 An Efficient Design of CCMP for Robust Security Network
  30. Altmetric Badge
    Chapter 29 Software-Based Copy Protection for Temporal Media During Dissemination and Playback
  31. Altmetric Badge
    Chapter 30 Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme
  32. Altmetric Badge
    Chapter 31 Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms
  33. Altmetric Badge
    Chapter 32 An Efficient Static Blind Ring Signature Scheme
  34. Altmetric Badge
    Chapter 33 Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model
  35. Altmetric Badge
    Chapter 34 Yet Another Forward Secure Signature from Bilinear Pairings
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 tweeter

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Cryptology - ICISC 2005
Published by
Springer Science & Business Media, April 2006
DOI 10.1007/11734727
ISBNs
978-3-54-033354-8, 978-3-54-033355-5
Editors

Won, Dong Ho, Kim, Seungjoo

Twitter Demographics

The data shown below were collected from the profile of 1 tweeter who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 1 100%
Readers by discipline Count As %
Computer Science 1 100%