↓ Skip to main content

Computer Security - ESORICS 2014

Overview of attention for book
Cover of 'Computer Security - ESORICS 2014'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Detecting Malicious Domains via Graph Inference
  3. Altmetric Badge
    Chapter 2 Empirically Measuring WHOIS Misuse
  4. Altmetric Badge
    Chapter 3 EncDNS: A Lightweight Privacy-Preserving Name Resolution Service
  5. Altmetric Badge
    Chapter 4 Ubic: Bridging the Gap between Digital Cryptography and the Physical World
  6. Altmetric Badge
    Chapter 5 Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks
  7. Altmetric Badge
    Chapter 6 Local Password Validation Using Self-Organizing Maps
  8. Altmetric Badge
    Chapter 7 Verifiable Delegation of Computations with Storage-Verification Trade-off
  9. Altmetric Badge
    Chapter 8 Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks
  10. Altmetric Badge
    Chapter 9 Verifiable Computation over Large Database with Incremental Updates
  11. Altmetric Badge
    Chapter 10 DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications
  12. Altmetric Badge
    Chapter 11 Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models
  13. Altmetric Badge
    Chapter 12 TrustDump: Reliable Memory Acquisition on Smartphones
  14. Altmetric Badge
    Chapter 13 A Framework to Secure Peripherals at Runtime
  15. Altmetric Badge
    Chapter 14 StealthGuard: Proofs of Retrievability with Hidden Watchdogs
  16. Altmetric Badge
    Chapter 15 An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
  17. Altmetric Badge
    Chapter 16 Verifiable Computation on Outsourced Encrypted Data
  18. Altmetric Badge
    Chapter 17 Verifiable Computation with Reduced Informational Costs and Computational Costs
  19. Altmetric Badge
    Chapter 18 Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization
  20. Altmetric Badge
    Chapter 19 Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage
  21. Altmetric Badge
    Chapter 20 Quantitative Workflow Resiliency
  22. Altmetric Badge
    Chapter 21 Who Is Touching My Cloud
  23. Altmetric Badge
    Chapter 22 Computer Security - ESORICS 2014
  24. Altmetric Badge
    Chapter 23 Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
  25. Altmetric Badge
    Chapter 24 Authorized Keyword Search on Encrypted Data
  26. Altmetric Badge
    Chapter 25 Double-Authentication-Preventing Signatures
  27. Altmetric Badge
    Chapter 26 Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL
  28. Altmetric Badge
    Chapter 27 Efficient Hidden Vector Encryption with Constant-Size Ciphertext
  29. Altmetric Badge
    Chapter 28 Enabling Short Fragments for Uncoordinated Spread Spectrum Communication
  30. Altmetric Badge
    Chapter 29 Fingerprinting Far Proximity from Radio Emissions
  31. Altmetric Badge
    Chapter 30 A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks
Attention for Chapter 26: Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL
Altmetric Badge

About this Attention Score

  • Above-average Attention Score compared to outputs of the same age (56th percentile)
  • Above-average Attention Score compared to outputs of the same age and source (54th percentile)

Mentioned by

wikipedia
3 Wikipedia pages

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
17 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL
Chapter number 26
Book title
Computer Security - ESORICS 2014
Published in
Lecture notes in computer science, September 2014
DOI 10.1007/978-3-319-11203-9_26
Book ISBNs
978-3-31-911202-2, 978-3-31-911203-9
Authors

Yongge Wang, Tony Nicol, Wang, Yongge, Nicol, Tony

Editors

Mirosław Kutyłowski, Jaideep Vaidya

Mendeley readers

The data shown below were compiled from readership statistics for 17 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 17 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 5 29%
Student > Master 3 18%
Researcher 2 12%
Professor 2 12%
Other 1 6%
Other 2 12%
Unknown 2 12%
Readers by discipline Count As %
Computer Science 14 82%
Engineering 1 6%
Unknown 2 12%

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 22 December 2018.
All research outputs
#7,453,350
of 22,786,087 outputs
Outputs from Lecture notes in computer science
#2,486
of 8,125 outputs
Outputs of similar age
#77,086
of 238,774 outputs
Outputs of similar age from Lecture notes in computer science
#89
of 223 outputs
Altmetric has tracked 22,786,087 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,125 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 55% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 238,774 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 56% of its contemporaries.
We're also able to compare this research output to 223 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 54% of its contemporaries.