↓ Skip to main content

Advances in Information and Computer Security

Overview of attention for book
Cover of 'Advances in Information and Computer Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Privacy-Friendly Access Control Based on Personal Attributes
  3. Altmetric Badge
    Chapter 2 Are You Threatening My Hazards?
  4. Altmetric Badge
    Chapter 3 Complicating Process Identification by Replacing Process Information for Attack Avoidance
  5. Altmetric Badge
    Chapter 4 Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints
  6. Altmetric Badge
    Chapter 5 Key Management for Onion Routing in a True Peer to Peer Setting
  7. Altmetric Badge
    Chapter 6 Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication
  8. Altmetric Badge
    Chapter 7 Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field
  9. Altmetric Badge
    Chapter 8 Secure Multi-Party Computation for Elliptic Curves
  10. Altmetric Badge
    Chapter 9 More Constructions of Re-splittable Threshold Public Key Encryption
  11. Altmetric Badge
    Chapter 10 How to Effectively Decrease the Resource Requirement in Template Attack?
  12. Altmetric Badge
    Chapter 11 Deterministic Hard Fault Attack on Trivium
  13. Altmetric Badge
    Chapter 12 DPA Resilience of Rotation-Symmetric S-boxes
  14. Altmetric Badge
    Chapter 13 A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering
  15. Altmetric Badge
    Chapter 14 Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics
  16. Altmetric Badge
    Chapter 15 On the Security Proof of an Authentication Protocol from Eurocrypt 2011
  17. Altmetric Badge
    Chapter 16 Improved Linear Cryptanalysis of Reduced-Round MIBS
  18. Altmetric Badge
    Chapter 17 Characterization of EME with Linear Mixing
  19. Altmetric Badge
    Chapter 18 Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty
  20. Altmetric Badge
    Chapter 19 Related Key Secure PKE from Hash Proof Systems
  21. Altmetric Badge
    Chapter 20 Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy
  22. Altmetric Badge
    Chapter 21 Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data
Attention for Chapter 2: Are You Threatening My Hazards?
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
25 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Are You Threatening My Hazards?
Chapter number 2
Book title
Advances in Information and Computer Security
Published by
Springer, Cham, August 2014
DOI 10.1007/978-3-319-09843-2_2
Book ISBNs
978-3-31-909842-5, 978-3-31-909843-2
Authors

Marina Krotofil, Jason Larsen, Krotofil, Marina, Larsen, Jason

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 25 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 25 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 32%
Researcher 3 12%
Student > Master 3 12%
Lecturer 1 4%
Professor 1 4%
Other 3 12%
Unknown 6 24%
Readers by discipline Count As %
Computer Science 15 60%
Engineering 3 12%
Physics and Astronomy 1 4%
Unknown 6 24%