↓ Skip to main content

Information Security and Cryptology

Overview of attention for book
Cover of 'Information Security and Cryptology'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Efficient Privacy-Preserving E-coupon System
  3. Altmetric Badge
    Chapter 2 Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
  4. Altmetric Badge
    Chapter 3 Security of Direct Anonymous Authentication Using TPM 2.0 Signature
  5. Altmetric Badge
    Chapter 4 Revocation in Publicly Verifiable Outsourced Computation
  6. Altmetric Badge
    Chapter 5 Private Aggregation with Custom Collusion Tolerance
  7. Altmetric Badge
    Chapter 6 Ring Signatures of Constant Size Without Random Oracles
  8. Altmetric Badge
    Chapter 7 Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control
  9. Altmetric Badge
    Chapter 8 Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge
  10. Altmetric Badge
    Chapter 9 A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC
  11. Altmetric Badge
    Chapter 10 Optimal Proximity Proofs
  12. Altmetric Badge
    Chapter 11 Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions
  13. Altmetric Badge
    Chapter 12 Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization
  14. Altmetric Badge
    Chapter 13 Fully Homomorphic Encryption with Auxiliary Inputs
  15. Altmetric Badge
    Chapter 14 Trapdoors for Ideal Lattices with Applications
  16. Altmetric Badge
    Chapter 15 Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails
  17. Altmetric Badge
    Chapter 16 The Boomerang Attacks on BLAKE and BLAKE2
  18. Altmetric Badge
    Chapter 17 Second Preimage Analysis of Whirlwind
  19. Altmetric Badge
    Chapter 18 Boomerang Attack on Step-Reduced SHA-512
  20. Altmetric Badge
    Chapter 19 Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
  21. Altmetric Badge
    Chapter 20 Rig: A Simple, Secure and Flexible Design for Password Hashing
  22. Altmetric Badge
    Chapter 21 Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption
  23. Altmetric Badge
    Chapter 22 Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
  24. Altmetric Badge
    Chapter 23 Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks
  25. Altmetric Badge
    Chapter 24 Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
  26. Altmetric Badge
    Chapter 25 A Note on Diem’s Proof
  27. Altmetric Badge
    Chapter 26 Stand-by Attacks on E-ID Password Authentication
  28. Altmetric Badge
    Chapter 27 Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
  29. Altmetric Badge
    Chapter 28 A Lightweight Security Isolation Approach for Virtual Machines Deployment
  30. Altmetric Badge
    Chapter 29 A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 tweeter
wikipedia
1 Wikipedia page

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Cryptology
Published by
Springer International Publishing, March 2015
DOI 10.1007/978-3-319-16745-9
ISBNs
978-3-31-916744-2, 978-3-31-916745-9
Editors

Lin, Dongdai, Yung, Moti, Zhou, Jianying

Twitter Demographics

The data shown below were collected from the profile of 1 tweeter who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 21 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 5 24%
Student > Ph. D. Student 4 19%
Student > Doctoral Student 3 14%
Other 2 10%
Researcher 2 10%
Other 5 24%
Readers by discipline Count As %
Computer Science 15 71%
Engineering 4 19%
Earth and Planetary Sciences 1 5%
Mathematics 1 5%