↓ Skip to main content

Information Security and Cryptology

Overview of attention for book
Cover of 'Information Security and Cryptology'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Efficient Privacy-Preserving E-coupon System
  3. Altmetric Badge
    Chapter 2 Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
  4. Altmetric Badge
    Chapter 3 Security of Direct Anonymous Authentication Using TPM 2.0 Signature
  5. Altmetric Badge
    Chapter 4 Revocation in Publicly Verifiable Outsourced Computation
  6. Altmetric Badge
    Chapter 5 Private Aggregation with Custom Collusion Tolerance
  7. Altmetric Badge
    Chapter 6 Ring Signatures of Constant Size Without Random Oracles
  8. Altmetric Badge
    Chapter 7 Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control
  9. Altmetric Badge
    Chapter 8 Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge
  10. Altmetric Badge
    Chapter 9 A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC
  11. Altmetric Badge
    Chapter 10 Optimal Proximity Proofs
  12. Altmetric Badge
    Chapter 11 Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions
  13. Altmetric Badge
    Chapter 12 Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization
  14. Altmetric Badge
    Chapter 13 Fully Homomorphic Encryption with Auxiliary Inputs
  15. Altmetric Badge
    Chapter 14 Trapdoors for Ideal Lattices with Applications
  16. Altmetric Badge
    Chapter 15 Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails
  17. Altmetric Badge
    Chapter 16 The Boomerang Attacks on BLAKE and BLAKE2
  18. Altmetric Badge
    Chapter 17 Second Preimage Analysis of Whirlwind
  19. Altmetric Badge
    Chapter 18 Boomerang Attack on Step-Reduced SHA-512
  20. Altmetric Badge
    Chapter 19 Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
  21. Altmetric Badge
    Chapter 20 Rig: A Simple, Secure and Flexible Design for Password Hashing
  22. Altmetric Badge
    Chapter 21 Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption
  23. Altmetric Badge
    Chapter 22 Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
  24. Altmetric Badge
    Chapter 23 Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks
  25. Altmetric Badge
    Chapter 24 Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
  26. Altmetric Badge
    Chapter 25 A Note on Diem’s Proof
  27. Altmetric Badge
    Chapter 26 Stand-by Attacks on E-ID Password Authentication
  28. Altmetric Badge
    Chapter 27 Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
  29. Altmetric Badge
    Chapter 28 A Lightweight Security Isolation Approach for Virtual Machines Deployment
  30. Altmetric Badge
    Chapter 29 A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors
Attention for Chapter 2: Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
Altmetric Badge

About this Attention Score

  • Above-average Attention Score compared to outputs of the same age (54th percentile)
  • Average Attention Score compared to outputs of the same age and source

Mentioned by

wikipedia
1 Wikipedia page

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
37 Mendeley