↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups
  3. Altmetric Badge
    Chapter 2 Related-Key Security for Hybrid Encryption
  4. Altmetric Badge
    Chapter 3 ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication
  5. Altmetric Badge
    Chapter 4 Attribute-Based Signatures for Circuits from Multilinear Maps
  6. Altmetric Badge
    Chapter 5 PAEQ: Parallelizable Permutation-Based Authenticated Encryption
  7. Altmetric Badge
    Chapter 6 (Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160
  8. Altmetric Badge
    Chapter 7 Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks
  9. Altmetric Badge
    Chapter 8 Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge
  10. Altmetric Badge
    Chapter 9 Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols
  11. Altmetric Badge
    Chapter 10 Efficient Secure and Verifiable Outsourcing of Matrix Multiplications
  12. Altmetric Badge
    Chapter 11 Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations
  13. Altmetric Badge
    Chapter 12 Exploiting the Floating-Point Computing Power of GPUs for RSA
  14. Altmetric Badge
    Chapter 13 On Formally Bounding Information Leakage by Statistical Estimation
  15. Altmetric Badge
    Chapter 14 Structure Based Data De-Anonymization of Social Networks and Mobility Traces
  16. Altmetric Badge
    Chapter 15 Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics
  17. Altmetric Badge
    Chapter 16 SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection
  18. Altmetric Badge
    Chapter 17 Soundsquatting: Uncovering the Use of Homophones in Domain Squatting
  19. Altmetric Badge
    Chapter 18 Reducing User Tracking through Automatic Web Site State Isolations
  20. Altmetric Badge
    Chapter 19 Comprehensive Behavior Profiling for Proactive Android Malware Detection
  21. Altmetric Badge
    Chapter 20 Analyzing Android Browser Apps for file:// Vulnerabilities
  22. Altmetric Badge
    Chapter 21 Expressive and Secure Searchable Encryption in the Public Key Setting
  23. Altmetric Badge
    Chapter 22 Graded Encryption, or How to Play “Who Wants To Be A Millionaire?” Distributively
  24. Altmetric Badge
    Chapter 23 Adding Controllable Linkability to Pairing-Based Group Signatures for Free
  25. Altmetric Badge
    Chapter 24 “To Share or not to Share” in Client-Side Encrypted Clouds
  26. Altmetric Badge
    Chapter 25 eavesROP: Listening for ROP Payloads in Data Streams
  27. Altmetric Badge
    Chapter 26 Defining Injection Attacks
  28. Altmetric Badge
    Chapter 27 Efficient Attack Forest Construction for Automotive On-board Networks
  29. Altmetric Badge
    Chapter 28 Winnowing Double Structure for Wildcard Query in Payload Attribution
  30. Altmetric Badge
    Chapter 29 An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments
  31. Altmetric Badge
    Chapter 30 transAD: An Anomaly Detection Network Intrusion Sensor for the Web
  32. Altmetric Badge
    Chapter 31 Using Machine Language Model for Mimimorphic Malware Detection
  33. Altmetric Badge
    Chapter 32 CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump
  34. Altmetric Badge
    Chapter 33 SIACHEN: A Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting Attacks
  35. Altmetric Badge
    Chapter 34 Security Issues in OAuth 2.0 SSO Implementations
  36. Altmetric Badge
    Chapter 35 A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices
  37. Altmetric Badge
    Chapter 36 MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices
Attention for Chapter 36: MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
24 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices
Chapter number 36
Book title
Information Security
Published by
Springer, Cham, October 2014
DOI 10.1007/978-3-319-13257-0_36
Book ISBNs
978-3-31-913256-3, 978-3-31-913257-0
Authors

Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing, Yu, Xingjie, Chen, Bo, Wang, Zhan, Chang, Bing, Zhu, Wen Tao, Jing, Jiwu

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 24 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 24 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 6 25%
Student > Master 4 17%
Researcher 3 13%
Professor > Associate Professor 2 8%
Other 1 4%
Other 3 13%
Unknown 5 21%
Readers by discipline Count As %
Computer Science 18 75%
Physics and Astronomy 1 4%
Unknown 5 21%