↓ Skip to main content

E-Business and Telecommunications

Overview of attention for book
Cover of 'E-Business and Telecommunications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Biometric Privacy Protection: Guidelines and Technologies
  3. Altmetric Badge
    Chapter 2 Face Recognition in Uncontrolled Environments, Experiments in an Airport
  4. Altmetric Badge
    Chapter 3 Paradigms of Distributed Software Systems: Services, Processes and Self-organization
  5. Altmetric Badge
    Chapter 4 A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks
  6. Altmetric Badge
    Chapter 5 Evaluating Super Node Selection and Load Balancing in P2P VoIP Networks Using Stochastic Graph Transformation
  7. Altmetric Badge
    Chapter 6 Shared Security: How Wireless Sensor Networks Can Benefit from Threshold Cryptography
  8. Altmetric Badge
    Chapter 7 Selection of Information-Intensive Services: A Multi-criteria Decision Model
  9. Altmetric Badge
    Chapter 8 Territorial Safety Networks
  10. Altmetric Badge
    Chapter 9 Killer Applications for Fiber to the Home Networks: Market Potential, Time Horizons and User Groups
  11. Altmetric Badge
    Chapter 10 To Bid or Not To Bid? Investigating Retail-Brand Keyword Performance in Sponsored Search Advertising
  12. Altmetric Badge
    Chapter 11 Client-Oriented Preferences Model for QoS Aggregation in Service-Based Applications
  13. Altmetric Badge
    Chapter 12 An Answer to “Who Needs a Stylus?” on Handwriting Recognition on Mobile Devices
  14. Altmetric Badge
    Chapter 13 Application of Metamorphic Testing to a Case Study in Web Services Compositions
  15. Altmetric Badge
    Chapter 14 Time Stretching of UWB Radio Signals Using a Photonic Analogue-to-Digital Converter System Based on Wavelength Division Multiplexing
  16. Altmetric Badge
    Chapter 15 Spam Filtering through Anomaly Detection
  17. Altmetric Badge
    Chapter 16 On the Feasibility of Malware Attacks in Smartphone Platforms
  18. Altmetric Badge
    Chapter 17 Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme
  19. Altmetric Badge
    Chapter 18 Accelerating Reduction for Enabling Fast Multiplication over Large Binary Fields
  20. Altmetric Badge
    Chapter 19 A Related-Key Attack against Multiple Encryption Based on Fixed Points
  21. Altmetric Badge
    Chapter 20 Byte Slicing Grøstl : Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl
  22. Altmetric Badge
    Chapter 21 Attack Interference: A Path to Defending Security Protocols
  23. Altmetric Badge
    Chapter 22 A Framework for Dynamic Optimization of Security and Performances
  24. Altmetric Badge
    Chapter 23 Broadcast Authentication in a Low Speed Controller Area Network
  25. Altmetric Badge
    Chapter 24 Efficiently Managing Multimedia Hierarchical Data with the WINDSURF Library
  26. Altmetric Badge
    Chapter 25 A Method of Real-Time Non-uniform Speech Stretching
  27. Altmetric Badge
    Chapter 26 Decoding of LDPC-Based 2D-Barcodes Using a 2D-Hidden-Markov-Model
  28. Altmetric Badge
    Chapter 27 A Comparative Evaluation of Gaussian Multiscale Aggregation for Hand Biometrics
  29. Altmetric Badge
    Chapter 28 Touching Character Segmentation Method of Archaic Lanna Script
  30. Altmetric Badge
    Chapter 29 Small and Large Vocabulary Speech Recognition of MP3 Data under Real-Word Conditions: Experimental Study
  31. Altmetric Badge
    Chapter 30 Weight Based Fast Mode Decision for H.264/AVC Video Coding Standard
  32. Altmetric Badge
    Chapter 31 Investigation and Improved Configuration Settings for H.264 CGS/MGS Quality Scalable Coding
  33. Altmetric Badge
    Chapter 32 Downlink Multiuser MIMO-OFDM Systems
  34. Altmetric Badge
    Chapter 33 Experience in Deploying a Wireless Sensor Network in a Vineyard
  35. Altmetric Badge
    Chapter 34 Experimental Detection and Synchronisation Validation for a TR-UWB System Based on the Time Delayed Sampling and Correletion Scheme
  36. Altmetric Badge
    Chapter 35 Link Adaptation in Ad Hoc Networks Based on Interference Minimization
  37. Altmetric Badge
    Chapter 36 Unidirectional Traffic Flow to Protect Wireless Sensor Networks against Byzantine Attacks
  38. Altmetric Badge
    Chapter 37 Successive Interference Cancellation for Multi-user MIMO-OFDM Ad-Hoc Networks: A Performance-Complexity Tradeoff
Attention for Chapter 20: Byte Slicing Grøstl : Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Byte Slicing Grøstl : Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl
Chapter number 20
Book title
E-Business and Telecommunications
Published by
Springer, Berlin, Heidelberg, July 2011
DOI 10.1007/978-3-642-35755-8_20
Book ISBNs
978-3-64-235754-1, 978-3-64-235755-8
Authors

Kazumaro Aoki, Krystian Matusiewicz, Günther Roland, Yu Sasaki, Martin Schläffer

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 100%
Readers by discipline Count As %
Computer Science 1 100%