↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Cryptographic Hash Functions: Theory and Practice
  3. Altmetric Badge
    Chapter 2 Rewriting of SPARQL/Update Queries for Securing Data Access
  4. Altmetric Badge
    Chapter 3 Fine-Grained Disclosure of Access Policies
  5. Altmetric Badge
    Chapter 4 Manger’s Attack Revisited
  6. Altmetric Badge
    Chapter 5 Horizontal Correlation Analysis on Exponentiation
  7. Altmetric Badge
    Chapter 6 Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
  8. Altmetric Badge
    Chapter 7 A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks
  9. Altmetric Badge
    Chapter 8 CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization
  10. Altmetric Badge
    Chapter 9 SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms
  11. Altmetric Badge
    Chapter 10 Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol
  12. Altmetric Badge
    Chapter 11 Compromise-Resilient Anti-jamming for Wireless Sensor Networks
  13. Altmetric Badge
    Chapter 12 On Practical Second-Order Power Analysis Attacks for Block Ciphers
  14. Altmetric Badge
    Chapter 13 Consecutive S-box Lookups: A Timing Attack on SNOW 3G
  15. Altmetric Badge
    Chapter 14 Efficient Authentication for Mobile and Pervasive Computing
  16. Altmetric Badge
    Chapter 15 Security Enhancement and Modular Treatment towards Authenticated Key Exchange
  17. Altmetric Badge
    Chapter 16 Federated Secret Handshakes with Support for Revocation
  18. Altmetric Badge
    Chapter 17 An Agent-Mediated Fair Exchange Protocol
  19. Altmetric Badge
    Chapter 18 A New Method for Formalizing Optimistic Fair Exchange Protocols
  20. Altmetric Badge
    Chapter 19 Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme
  21. Altmetric Badge
    Chapter 20 Proving Coercion-Resistance of Scantegrity II
  22. Altmetric Badge
    Chapter 21 Anonymity and Verifiability in Voting: Understanding (Un)Linkability
  23. Altmetric Badge
    Chapter 22 A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms
  24. Altmetric Badge
    Chapter 23 Time Warp: How Time Affects Privacy in LBSs
  25. Altmetric Badge
    Chapter 24 Return-Oriented Rootkit without Returns (on the x86)
  26. Altmetric Badge
    Chapter 25 Experimental Threat Model Reuse with Misuse Case Diagrams
  27. Altmetric Badge
    Chapter 26 Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis
  28. Altmetric Badge
    Chapter 27 Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
  29. Altmetric Badge
    Chapter 28 Ciphertext Policy Attribute-Based Proxy Re-encryption
  30. Altmetric Badge
    Chapter 29 Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks
  31. Altmetric Badge
    Chapter 30 A Trust-Based IDS for the AODV Protocol
  32. Altmetric Badge
    Chapter 31 IDS Alert Visualization and Monitoring through Heuristic Host Selection
  33. Altmetric Badge
    Chapter 32 A Two-Tier System for Web Attack Detection Using Linear Discriminant Method
Attention for Chapter 20: Proving Coercion-Resistance of Scantegrity II
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
23 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Proving Coercion-Resistance of Scantegrity II
Chapter number 20
Book title
Information and Communications Security
Published by
Springer, Berlin, Heidelberg, December 2010
DOI 10.1007/978-3-642-17650-0_20
Book ISBNs
978-3-64-217649-4, 978-3-64-217650-0
Authors

Ralf Küsters, Tomasz Truderung, Andreas Vogt, Küsters, Ralf, Truderung, Tomasz, Vogt, Andreas

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 23 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 23 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 30%
Student > Master 6 26%
Professor > Associate Professor 2 9%
Researcher 2 9%
Professor 1 4%
Other 2 9%
Unknown 3 13%
Readers by discipline Count As %
Computer Science 18 78%
Mathematics 1 4%
Physics and Astronomy 1 4%
Unknown 3 13%