↓ Skip to main content

Cryptology and Network Security

Overview of attention for book
Cryptology and Network Security
Springer International Publishing

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers
  3. Altmetric Badge
    Chapter 2 Compact Representation for Division Property
  4. Altmetric Badge
    Chapter 3 An Automatic Cryptanalysis of Transposition Ciphers Using Compression
  5. Altmetric Badge
    Chapter 4 Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra
  6. Altmetric Badge
    Chapter 5 Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis
  7. Altmetric Badge
    Chapter 6 NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM
  8. Altmetric Badge
    Chapter 7 Server-Aided Revocable Identity-Based Encryption from Lattices
  9. Altmetric Badge
    Chapter 8 Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography
  10. Altmetric Badge
    Chapter 9 An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins
  11. Altmetric Badge
    Chapter 10 Breaking PPTP VPNs via RADIUS Encryption
  12. Altmetric Badge
    Chapter 11 LEAP: A Next-Generation Client VPN and Encrypted Email Provider
  13. Altmetric Badge
    Chapter 12 Implementation State of HSTS and HPKP in Both Browsers and Servers
  14. Altmetric Badge
    Chapter 13 Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
  15. Altmetric Badge
    Chapter 14 Group Signature with Deniability: How to Disavow a Signature
  16. Altmetric Badge
    Chapter 15 Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries
  17. Altmetric Badge
    Chapter 16 Secure Error-Tolerant Graph Matching Protocols
  18. Altmetric Badge
    Chapter 17 Efficient Verifiable Computation of XOR for Biometric Authentication
  19. Altmetric Badge
    Chapter 18 Verifiable Message-Locked Encryption
  20. Altmetric Badge
    Chapter 19 Security of Online AE Schemes in RUP Setting
  21. Altmetric Badge
    Chapter 20 An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties
  22. Altmetric Badge
    Chapter 21 Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption
  23. Altmetric Badge
    Chapter 22 AAL and Static Conflict Detection in Policy
  24. Altmetric Badge
    Chapter 23 Component-Oriented Access Control for Deployment of Application Services in Containerized Environments
  25. Altmetric Badge
    Chapter 24 Generic Access Control System for Ad Hoc MCC and Fog Computing
  26. Altmetric Badge
    Chapter 25 SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
  27. Altmetric Badge
    Chapter 26 FHE Over the Integers and Modular Arithmetic Circuits
  28. Altmetric Badge
    Chapter 27 An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization
  29. Altmetric Badge
    Chapter 28 Efficient, XOR-Based, Ideal \((t,n)-\) threshold Schemes
  30. Altmetric Badge
    Chapter 29 Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards
  31. Altmetric Badge
    Chapter 30 Efficient Card-Based Cryptographic Protocols for Millionaires’ Problem Utilizing Private Permutations
  32. Altmetric Badge
    Chapter 31 Evaluation on Malware Classification by Session Sequence of Common Protocols
  33. Altmetric Badge
    Chapter 32 An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems
  34. Altmetric Badge
    Chapter 33 Detecting Malware Through Anti-analysis Signals - A Preliminary Study
  35. Altmetric Badge
    Chapter 34 Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case
  36. Altmetric Badge
    Chapter 35 Improved Attacks on Extended Generalized Feistel Networks
  37. Altmetric Badge
    Chapter 36 When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015
  38. Altmetric Badge
    Chapter 37 On the Power of Public-key Function-Private Functional Encryption
  39. Altmetric Badge
    Chapter 38 A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption
  40. Altmetric Badge
    Chapter 39 An Efficient Construction of Non-Interactive Secure Multiparty Computation
  41. Altmetric Badge
    Chapter 40 An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market
  42. Altmetric Badge
    Chapter 41 Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators
  43. Altmetric Badge
    Chapter 42 Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation
  44. Altmetric Badge
    Chapter 43 DNSSEC Misconfigurations in Popular Domains
  45. Altmetric Badge
    Chapter 44 Integral Privacy
  46. Altmetric Badge
    Chapter 45 Sharing Is Caring, or Callous?
  47. Altmetric Badge
    Chapter 46 Improving the Sphinx Mix Network
  48. Altmetric Badge
    Chapter 47 User Authentication from Mouse Movement Data Using SVM Classifier
  49. Altmetric Badge
    Chapter 48 Distance Bounding Based on PUF
  50. Altmetric Badge
    Chapter 49 Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services
  51. Altmetric Badge
    Chapter 50 Range Query Integrity in Cloud Data Streams with Efficient Insertion
  52. Altmetric Badge
    Chapter 51 Vulnerability Analysis Using Google and Shodan
  53. Altmetric Badge
    Chapter 52 Language-Based Hypervisors
  54. Altmetric Badge
    Chapter 53 Internet Censorship in Italy: A First Look at 3G/4G Networks
  55. Altmetric Badge
    Chapter 54 A Privacy-Preserving Model for Biometric Fusion
  56. Altmetric Badge
    Chapter 55 Hybrid WBC: Secure and Efficient White-Box Encryption Schemes
  57. Altmetric Badge
    Chapter 56 Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (91st percentile)
  • High Attention Score compared to outputs of the same age and source (88th percentile)

Mentioned by

news
1 news outlet
twitter
9 X users
wikipedia
3 Wikipedia pages

Readers on

mendeley
6 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Cryptology and Network Security
Published by
Lecture notes in computer science, January 2016
DOI 10.1007/978-3-319-48965-0
ISBNs
978-3-31-948964-3, 978-3-31-948965-0
Editors

Sara Foresti, Giuseppe Persiano

Timeline

Login to access the full chart related to this output.

If you don’t have an account, click here to discover Explorer

X Demographics

X Demographics

The data shown below were collected from the profiles of 9 X users who shared this research output. Click here to find out more about how the information was compiled.
As of 1 July 2024, you may notice a temporary increase in the numbers of X profiles with Unknown location. Click here to learn more.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 6 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 6 100%

Demographic breakdown

Readers by professional status Count As %
Unspecified 2 33%
Student > Master 2 33%
Student > Ph. D. Student 1 17%
Student > Postgraduate 1 17%
Readers by discipline Count As %
Unspecified 2 33%
Computer Science 2 33%
Agricultural and Biological Sciences 1 17%
Social Sciences 1 17%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 18. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 23 March 2023.
All research outputs
#1,900,739
of 23,924,883 outputs
Outputs from Lecture notes in computer science
#321
of 8,167 outputs
Outputs of similar age
#33,676
of 400,461 outputs
Outputs of similar age from Lecture notes in computer science
#70
of 581 outputs
Altmetric has tracked 23,924,883 research outputs across all sources so far. Compared to these this one has done particularly well and is in the 92nd percentile: it's in the top 10% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,167 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has done particularly well, scoring higher than 96% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 400,461 tracked outputs that were published within six weeks on either side of this one in any source. This one has done particularly well, scoring higher than 91% of its contemporaries.
We're also able to compare this research output to 581 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 88% of its contemporaries.