↓ Skip to main content

Computer Network Security

Overview of attention for book
Cover of 'Computer Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 ForNet: A Distributed Forensics Network
  3. Altmetric Badge
    Chapter 2 Usage Control: A Vision for Next Generation Access Control
  4. Altmetric Badge
    Chapter 3 Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL
  5. Altmetric Badge
    Chapter 4 Complexity Problems in the Analysis of Information Systems Security
  6. Altmetric Badge
    Chapter 5 A Behavior-Based Approach to Securing Email Systems
  7. Altmetric Badge
    Chapter 6 Real-Time Intrusion Detection with Emphasis on Insider Attacks
  8. Altmetric Badge
    Chapter 7 Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols
  9. Altmetric Badge
    Chapter 8 GRID Security Review
  10. Altmetric Badge
    Chapter 9 A Knowledge-Based Repository Model for Security Policies Management
  11. Altmetric Badge
    Chapter 10 Symbolic Partial Model Checking for Security Analysis
  12. Altmetric Badge
    Chapter 11 Rule-Based Systems Security Model
  13. Altmetric Badge
    Chapter 12 Logical Resolving for Security Evaluation
  14. Altmetric Badge
    Chapter 13 Enhanced Correlation in an Intrusion Detection Process
  15. Altmetric Badge
    Chapter 14 Safeguarding SCADA Systems with Anomaly Detection
  16. Altmetric Badge
    Chapter 15 Experiments with Simulation of Attacks against Computer Networks
  17. Altmetric Badge
    Chapter 16 Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”
  18. Altmetric Badge
    Chapter 17 Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences
  19. Altmetric Badge
    Chapter 18 Distributed Access Control: A Logic-Based Approach
  20. Altmetric Badge
    Chapter 19 Advanced Certificate Status Protocol
  21. Altmetric Badge
    Chapter 20 Key History Tree: Efficient Group Key Management with Off-Line Members
  22. Altmetric Badge
    Chapter 21 A Certificate Status Checking Protocol for the Authenticated Dictionary
  23. Altmetric Badge
    Chapter 22 Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach
  24. Altmetric Badge
    Chapter 23 A Signcryption Scheme Based on Secret Sharing Technique
  25. Altmetric Badge
    Chapter 24 A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem
  26. Altmetric Badge
    Chapter 25 Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property
  27. Altmetric Badge
    Chapter 26 Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper
  28. Altmetric Badge
    Chapter 27 On Cipher Design Based on Switchable Controlled Operations
  29. Altmetric Badge
    Chapter 28 Elliptic Curve Point Multiplication
  30. Altmetric Badge
    Chapter 29 Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation
  31. Altmetric Badge
    Chapter 30 Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel
  32. Altmetric Badge
    Chapter 31 Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation
  33. Altmetric Badge
    Chapter 32 Digital Watermarking under a Filtering and Additive Noise Attack Condition
  34. Altmetric Badge
    Chapter 33 Data Hiding in Digital Audio by Frequency Domain Dithering
  35. Altmetric Badge
    Chapter 34 Steganography with Least Histogram Abnormality
  36. Altmetric Badge
    Chapter 35 Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences
  37. Altmetric Badge
    Chapter 36 Authentication of Anycast Communication
  38. Altmetric Badge
    Chapter 37 Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy
  39. Altmetric Badge
    Chapter 38 Construction of the Covert Channels
  40. Altmetric Badge
    Chapter 39 Privacy and Data Protection in Electronic Communications
  41. Altmetric Badge
    Chapter 40 Multiplier for Public-Key Cryptosystem Based on Cellular Automata
  42. Altmetric Badge
    Chapter 41 A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols
  43. Altmetric Badge
    Chapter 42 Alert Triage on the ROC
  44. Altmetric Badge
    Chapter 43 Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64
  45. Altmetric Badge
    Chapter 44 Immunocomputing Model of Intrusion Detection
  46. Altmetric Badge
    Chapter 45 Agent Platform Security Architecture
  47. Altmetric Badge
    Chapter 46 Support Vector Machine Based ICMP Covert Channel Attack Detection
  48. Altmetric Badge
    Chapter 47 Computer Immunology System with Variable Configuration
Attention for Chapter 29: Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation
Chapter number 29
Book title
Computer Network Security
Published by
Springer, Berlin, Heidelberg, September 2003
DOI 10.1007/978-3-540-45215-7_29
Book ISBNs
978-3-54-040797-3, 978-3-54-045215-7
Authors

N. Sklavos, A. A. Moldovyan, O. Koufopavlou

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 1 33%
Student > Ph. D. Student 1 33%
Other 1 33%
Readers by discipline Count As %
Computer Science 3 100%