↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Replacement Attacks on Behavior Based Software Birthmark
  3. Altmetric Badge
    Chapter 2 Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders
  4. Altmetric Badge
    Chapter 3 How to Find Short RC4 Colliding Key Pairs
  5. Altmetric Badge
    Chapter 4 A Formal Approach to Distance-Bounding RFID Protocols
  6. Altmetric Badge
    Chapter 5 MASHA – Low Cost Authentication with a New Stream Cipher
  7. Altmetric Badge
    Chapter 6 Toward Pairing-Free Certificateless Authenticated Key Exchanges
  8. Altmetric Badge
    Chapter 7 Security Analysis of an RSA Key Generation Algorithm with a Large Private Key
  9. Altmetric Badge
    Chapter 8 Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption
  10. Altmetric Badge
    Chapter 9 The n -Diffie-Hellman Problem and Its Applications
  11. Altmetric Badge
    Chapter 10 RatBot: Anti-enume rat ion Peer-to-Peer Botnets
  12. Altmetric Badge
    Chapter 11 Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes
  13. Altmetric Badge
    Chapter 12 Multi-stage Binary Code Obfuscation Using Improved Virtual Machine
  14. Altmetric Badge
    Chapter 13 Detection and Analysis of Cryptographic Data Inside Software
  15. Altmetric Badge
    Chapter 14 SudoWeb : Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms
  16. Altmetric Badge
    Chapter 15 Hello rootKitty: A Lightweight Invariance-Enforcing Framework
  17. Altmetric Badge
    Chapter 16 Opacity Analysis in Trust Management Systems
  18. Altmetric Badge
    Chapter 17 On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints
  19. Altmetric Badge
    Chapter 18 Round-Efficient Oblivious Database Manipulation
  20. Altmetric Badge
    Chapter 19 A Privacy-Preserving Join on Outsourced Database
  21. Altmetric Badge
    Chapter 20 APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks
  22. Altmetric Badge
    Chapter 21 Assessing Location Privacy in Mobile Communication Networks
  23. Altmetric Badge
    Chapter 22 How Much Is Enough? Choosing ε for Differential Privacy
  24. Altmetric Badge
    Chapter 23 Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security
  25. Altmetric Badge
    Chapter 24 An Efficient Construction of Time-Selective Convertible Undeniable Signatures
  26. Altmetric Badge
    Chapter 25 Efficient Fail-Stop Signatures from the Factoring Assumption
Attention for Chapter 22: How Much Is Enough? Choosing ε for Differential Privacy
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (73rd percentile)
  • High Attention Score compared to outputs of the same age and source (86th percentile)

Mentioned by

twitter
7 X users

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
129 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
How Much Is Enough? Choosing ε for Differential Privacy
Chapter number 22
Book title
Information Security
Published in
Lecture notes in computer science, October 2011
DOI 10.1007/978-3-642-24861-0_22
Book ISBNs
978-3-64-224860-3, 978-3-64-224861-0
Authors

Jaewoo Lee, Chris Clifton, Lee, Jaewoo, Clifton, Chris

X Demographics

X Demographics

The data shown below were collected from the profiles of 7 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 129 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
France 1 <1%
Unknown 128 99%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 33 26%
Student > Master 24 19%
Researcher 13 10%
Student > Doctoral Student 6 5%
Student > Bachelor 6 5%
Other 13 10%
Unknown 34 26%
Readers by discipline Count As %
Computer Science 70 54%
Mathematics 8 6%
Engineering 5 4%
Social Sciences 2 2%
Unspecified 1 <1%
Other 4 3%
Unknown 39 30%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 5. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 13 December 2016.
All research outputs
#5,991,882
of 22,797,621 outputs
Outputs from Lecture notes in computer science
#1,969
of 8,127 outputs
Outputs of similar age
#36,740
of 140,625 outputs
Outputs of similar age from Lecture notes in computer science
#7
of 53 outputs
Altmetric has tracked 22,797,621 research outputs across all sources so far. This one has received more attention than most of these and is in the 73rd percentile.
So far Altmetric has tracked 8,127 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done well, scoring higher than 75% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 140,625 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 73% of its contemporaries.
We're also able to compare this research output to 53 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 86% of its contemporaries.