↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems
  3. Altmetric Badge
    Chapter 2 Communication-Optimal Proactive Secret Sharing for Dynamic Groups
  4. Altmetric Badge
    Chapter 3 Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model
  5. Altmetric Badge
    Chapter 4 Generic Construction of UC-Secure Oblivious Transfer
  6. Altmetric Badge
    Chapter 5 Non-malleability Under Selective Opening Attacks: Implication and Separation
  7. Altmetric Badge
    Chapter 6 A Signature Scheme with a Fuzzy Private Key
  8. Altmetric Badge
    Chapter 7 Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe
  9. Altmetric Badge
    Chapter 8 Zero-Knowledge Authenticated Order Queries and Order Statistics on a List
  10. Altmetric Badge
    Chapter 9 Private Database Access with HE-over-ORAM Architecture
  11. Altmetric Badge
    Chapter 10 Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
  12. Altmetric Badge
    Chapter 11 LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data
  13. Altmetric Badge
    Chapter 12 Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking
  14. Altmetric Badge
    Chapter 13 Post-Quantum Forward-Secure Onion Routing
  15. Altmetric Badge
    Chapter 14 Scalable Divisible E-cash
  16. Altmetric Badge
    Chapter 15 Recovering Lost Device-Bound Credentials
  17. Altmetric Badge
    Chapter 16 Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
  18. Altmetric Badge
    Chapter 17 Applied Cryptography and Network Security
  19. Altmetric Badge
    Chapter 18 Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher
  20. Altmetric Badge
    Chapter 19 Cryptographic Enforcement of Information Flow Policies Without Public Information
  21. Altmetric Badge
    Chapter 20 A Fully Decentralized Data Usage Control Enforcement Infrastructure
  22. Altmetric Badge
    Chapter 21 Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
  23. Altmetric Badge
    Chapter 22 Exploiting Eye Tracking for Smartphone Authentication
  24. Altmetric Badge
    Chapter 23 Optimal Proximity Proofs Revisited
  25. Altmetric Badge
    Chapter 24 Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications
  26. Altmetric Badge
    Chapter 25 Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
  27. Altmetric Badge
    Chapter 26 Differential Power Analysis of a McEliece Cryptosystem
  28. Altmetric Badge
    Chapter 27 Arithmetic Addition over Boolean Masking
  29. Altmetric Badge
    Chapter 28 Foundations of Reconfigurable PUFs
  30. Altmetric Badge
    Chapter 29 mrPUF: A Novel Memristive Device Based Physical Unclonable Function
  31. Altmetric Badge
    Chapter 30 On the XOR of Multiple Random Permutations
  32. Altmetric Badge
    Chapter 31 Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
  33. Altmetric Badge
    Chapter 32 Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
  34. Altmetric Badge
    Chapter 33 Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Attention for Chapter 17: Applied Cryptography and Network Security
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • Good Attention Score compared to outputs of the same age (78th percentile)
  • High Attention Score compared to outputs of the same age and source (85th percentile)

Mentioned by

news
1 news outlet

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
19 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Applied Cryptography and Network Security
Chapter number 17
Book title
Applied Cryptography and Network Security
Published in
Lecture notes in computer science, June 2015
DOI 10.1007/978-3-319-28166-7_17
Book ISBNs
978-3-31-928165-0, 978-3-31-928166-7
Authors

Jiqiang Lu, Zhen Li, Matt Henricksen

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 19 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 19 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 37%
Student > Master 3 16%
Researcher 2 11%
Professor 1 5%
Other 1 5%
Other 2 11%
Unknown 3 16%
Readers by discipline Count As %
Computer Science 15 79%
Physics and Astronomy 1 5%
Unknown 3 16%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 7. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 21 October 2016.
All research outputs
#4,194,102
of 22,893,031 outputs
Outputs from Lecture notes in computer science
#989
of 8,129 outputs
Outputs of similar age
#53,468
of 267,835 outputs
Outputs of similar age from Lecture notes in computer science
#15
of 220 outputs
Altmetric has tracked 22,893,031 research outputs across all sources so far. Compared to these this one has done well and is in the 80th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,129 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done well, scoring higher than 82% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 267,835 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 78% of its contemporaries.
We're also able to compare this research output to 220 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 85% of its contemporaries.