↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Blockchain-Based Secure Data Provenance for Cloud Storage
  3. Altmetric Badge
    Chapter 2 uMine: A Blockchain Based on Human Miners
  4. Altmetric Badge
    Chapter 3 LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains
  5. Altmetric Badge
    Chapter 4 Study on Advanced Botnet Based on Publicly Available Resources
  6. Altmetric Badge
    Chapter 5 Deep Packet Inspection with Delayed Signature Matching in Network Auditing
  7. Altmetric Badge
    Chapter 6 Low-Rate DoS Attack Detection Based on Two-Step Cluster Analysis
  8. Altmetric Badge
    Chapter 7 On the Weakness of Constant Blinding PRNG in Flash Player
  9. Altmetric Badge
    Chapter 8 Random Number Generators Can Be Fooled to Behave Badly
  10. Altmetric Badge
    Chapter 9 Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation
  11. Altmetric Badge
    Chapter 10 Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain Multiplication
  12. Altmetric Badge
    Chapter 11 Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption Schemes
  13. Altmetric Badge
    Chapter 12 On Security in Encrypted Computing
  14. Altmetric Badge
    Chapter 13 PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing
  15. Altmetric Badge
    Chapter 14 Linking Differential Identifiability with Differential Privacy
  16. Altmetric Badge
    Chapter 15 PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction
  17. Altmetric Badge
    Chapter 16 Hierarchical Group Signatures with Verifier-Local Revocation
  18. Altmetric Badge
    Chapter 17 Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation
  19. Altmetric Badge
    Chapter 18 Towards Practical Lattice-Based One-Time Linkable Ring Signatures
  20. Altmetric Badge
    Chapter 19 Slop: Towards an Efficient and Universal Streaming Log Parser
  21. Altmetric Badge
    Chapter 20 Community Discovery of Attribution Trace Based on Deep Learning Approach
  22. Altmetric Badge
    Chapter 21 Examine Manipulated Datasets with Topology Data Analysis: A Case Study
  23. Altmetric Badge
    Chapter 22 Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption
  24. Altmetric Badge
    Chapter 23 Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage
  25. Altmetric Badge
    Chapter 24 Identity-Based Functional Encryption for Quadratic Functions from Lattices
  26. Altmetric Badge
    Chapter 25 Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption
  27. Altmetric Badge
    Chapter 26 Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage
  28. Altmetric Badge
    Chapter 27 Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency Comparisons
  29. Altmetric Badge
    Chapter 28 Verifiable Single-Server Private Information Retrieval
  30. Altmetric Badge
    Chapter 29 Cryptographic Password Obfuscation
  31. Altmetric Badge
    Chapter 30 CCA Secure Multi-recipient KEM from LPN
  32. Altmetric Badge
    Chapter 31 Witness-Indistinguishable Arguments with $$\varSigma $$ -Protocols for Bundled Witness Spaces and Its Application to Global Identities
  33. Altmetric Badge
    Chapter 32 Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree
  34. Altmetric Badge
    Chapter 33 PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized Environments
  35. Altmetric Badge
    Chapter 34 Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data
  36. Altmetric Badge
    Chapter 35 Certifying Variant of RSA with Generalized Moduli
  37. Altmetric Badge
    Chapter 36 Attack Trees in Isabelle
  38. Altmetric Badge
    Chapter 37 Automated Verification of Noninterference Property
  39. Altmetric Badge
    Chapter 38 Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets
  40. Altmetric Badge
    Chapter 39 Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications
  41. Altmetric Badge
    Chapter 40 MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query
  42. Altmetric Badge
    Chapter 41 Detecting Intrusion in the Traffic Signals of an Intelligent Traffic System
  43. Altmetric Badge
    Chapter 42 A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs
  44. Altmetric Badge
    Chapter 43 Simau: A Dynamic Privilege Management Mechanism for Host in Cloud Datacenters
  45. Altmetric Badge
    Chapter 44 USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework
  46. Altmetric Badge
    Chapter 45 FPGA-Based Assessment of Midori and Gift Lightweight Block Ciphers
  47. Altmetric Badge
    Chapter 46 Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor
  48. Altmetric Badge
    Chapter 47 PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX
  49. Altmetric Badge
    Chapter 48 Application of Public Ledgers to Revocation in Distributed Access Control
  50. Altmetric Badge
    Chapter 49 Micropaying to a Distributed Payee with Instant Confirmation
  51. Altmetric Badge
    Chapter 50 Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment
Attention for Chapter 34: Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
12 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data
Chapter number 34
Book title
Information and Communications Security
Published by
Springer, Cham, October 2018
DOI 10.1007/978-3-030-01950-1_34
Book ISBNs
978-3-03-001949-5, 978-3-03-001950-1
Authors

Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu, Han, Xiaohui, Wang, Lianhai, Xu, Shujiang, Zhao, Dawei, Liu, Guangqi

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 12 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 12 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 25%
Researcher 2 17%
Lecturer 1 8%
Student > Master 1 8%
Professor > Associate Professor 1 8%
Other 0 0%
Unknown 4 33%
Readers by discipline Count As %
Computer Science 7 58%
Physics and Astronomy 1 8%
Unknown 4 33%