↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Fast Square Root Computation Using the Frobenius Mapping
  3. Altmetric Badge
    Chapter 2 A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption
  4. Altmetric Badge
    Chapter 3 Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents
  5. Altmetric Badge
    Chapter 4 On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST
  6. Altmetric Badge
    Chapter 5 A Policy Based Framework for Access Control
  7. Altmetric Badge
    Chapter 6 Trading-Off Type-Inference Memory Complexity against Communication
  8. Altmetric Badge
    Chapter 7 Security Remarks on a Group Signature Scheme with Member Deletion
  9. Altmetric Badge
    Chapter 8 An Efficient Known Plaintext Attack on FEA-M
  10. Altmetric Badge
    Chapter 9 An Efficient Public-Key Framework
  11. Altmetric Badge
    Chapter 10 ROCEM: Robust Certified E-mail System Based on Server-Supported Signature
  12. Altmetric Badge
    Chapter 11 Practical Service Charge for P2P Content Distribution
  13. Altmetric Badge
    Chapter 12 ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback
  14. Altmetric Badge
    Chapter 13 A Lattice Based General Blind Watermark Scheme
  15. Altmetric Badge
    Chapter 14 Role-Based Access Control and the Access Control Matrix
  16. Altmetric Badge
    Chapter 15 Broadcast Encryption Schemes Based on the Sectioned Key Tree
  17. Altmetric Badge
    Chapter 16 Research on the Collusion Estimation
  18. Altmetric Badge
    Chapter 17 Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
  19. Altmetric Badge
    Chapter 18 Protocols for Malicious Host Revocation
  20. Altmetric Badge
    Chapter 19 A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code
  21. Altmetric Badge
    Chapter 20 A Novel Two-Level Trust Model for Grid
  22. Altmetric Badge
    Chapter 21 Practical t-out-n Oblivious Transfer and Its Applications
  23. Altmetric Badge
    Chapter 22 Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
  24. Altmetric Badge
    Chapter 23 ID-Based Distributed “Magic Ink” Signature from Pairings
  25. Altmetric Badge
    Chapter 24 A Simple Anonymous Fingerprinting Scheme Based on Blind Signature
  26. Altmetric Badge
    Chapter 25 Compact Conversion Schemes for the Probabilistic OW-PCA Primitives
  27. Altmetric Badge
    Chapter 26 A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems
  28. Altmetric Badge
    Chapter 27 A Novel Efficient Group Signature Scheme with Forward Security
  29. Altmetric Badge
    Chapter 28 Variations of Diffie-Hellman Problem
  30. Altmetric Badge
    Chapter 29 A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine
  31. Altmetric Badge
    Chapter 30 A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine
  32. Altmetric Badge
    Chapter 31 UC-RBAC: A Usage Constrained Role-Based Access Control Model
  33. Altmetric Badge
    Chapter 32 (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography
  34. Altmetric Badge
    Chapter 33 An Optimized Multi-bits Blind Watermarking Scheme
  35. Altmetric Badge
    Chapter 34 A Compound Intrusion Detection Model
  36. Altmetric Badge
    Chapter 35 An Efficient Convertible Authenticated Encryption Scheme and Its Variant
  37. Altmetric Badge
    Chapter 36 Space-Economical Reassembly for Intrusion Detection System
  38. Altmetric Badge
    Chapter 37 A Functional Decomposition of Virus and Worm Programs
Attention for Chapter 21: Practical t-out-n Oblivious Transfer and Its Applications
Altmetric Badge

Mentioned by

twitter
2 X users

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
28 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Practical t-out-n Oblivious Transfer and Its Applications
Chapter number 21
Book title
Information and Communications Security
Published by
Springer, Berlin, Heidelberg, October 2003
DOI 10.1007/978-3-540-39927-8_21
Book ISBNs
978-3-54-020150-2, 978-3-54-039927-8
Authors

Qian-Hong Wu, Jian-Hong Zhang, Yu-Min Wang, Wu, Qian-Hong, Zhang, Jian-Hong, Wang, Yu-Min

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 28 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 28 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 29%
Student > Master 6 21%
Professor 4 14%
Researcher 2 7%
Student > Postgraduate 2 7%
Other 4 14%
Unknown 2 7%
Readers by discipline Count As %
Computer Science 19 68%
Mathematics 2 7%
Business, Management and Accounting 1 4%
Physics and Astronomy 1 4%
Social Sciences 1 4%
Other 1 4%
Unknown 3 11%