↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
  3. Altmetric Badge
    Chapter 2 Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting
  4. Altmetric Badge
    Chapter 3 Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files
  5. Altmetric Badge
    Chapter 4 Witness Encryption from Smooth Projective Hashing System
  6. Altmetric Badge
    Chapter 5 More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
  7. Altmetric Badge
    Chapter 6 QUIC Protocol with Post-quantum Authentication
  8. Altmetric Badge
    Chapter 7 Batched Fully Homomorphic Encryption from TFHE
  9. Altmetric Badge
    Chapter 8 Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization
  10. Altmetric Badge
    Chapter 9 Further Cryptanalysis of a Type of RSA Variants
  11. Altmetric Badge
    Chapter 10 The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64
  12. Altmetric Badge
    Chapter 11 Efficient Scalar Multiplication on Koblitz Curves with Pre-computation
  13. Altmetric Badge
    Chapter 12 Efficient ECDSA-Based Adaptor Signature for Batched Atomic Swaps
  14. Altmetric Badge
    Chapter 13 Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization
  15. Altmetric Badge
    Chapter 14 GRUZ: Practical Resource Fair Exchange Without Blockchain
  16. Altmetric Badge
    Chapter 15 Daric: A Storage Efficient Payment Channel with Punishment Mechanism
  17. Altmetric Badge
    Chapter 16 A Blockchain-Based Mutual Authentication Protocol for Smart Home
  18. Altmetric Badge
    Chapter 17 OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control
  19. Altmetric Badge
    Chapter 18 EarlyCrow : Detecting APT Malware Command and Control over HTTP(S) Using Contextual Summaries
  20. Altmetric Badge
    Chapter 19 ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence
  21. Altmetric Badge
    Chapter 20 Dissecting Applications Uninstallers and Removers: Are They Effective?
  22. Altmetric Badge
    Chapter 21 Representing LLVM-IR in a Code Property Graph
  23. Altmetric Badge
    Chapter 22 Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security
  24. Altmetric Badge
    Chapter 23 Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay
  25. Altmetric Badge
    Chapter 24 AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition
  26. Altmetric Badge
    Chapter 25 HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud
  27. Altmetric Badge
    Chapter 26 Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64
  28. Altmetric Badge
    Chapter 27 CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks
  29. Altmetric Badge
    Chapter 28 Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing
  30. Altmetric Badge
    Chapter 29 Communication-Efficient and Secure Federated Learning Based on Adaptive One-Bit Compressed Sensing
Attention for Chapter 20: Dissecting Applications Uninstallers and Removers: Are They Effective?
Altmetric Badge

Mentioned by

twitter
4 X users
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Dissecting Applications Uninstallers and Removers: Are They Effective?
Chapter number 20
Book title
Information Security
Published by
Springer, Cham, January 2022
DOI 10.1007/978-3-031-22390-7_20
Book ISBNs
978-3-03-122389-1, 978-3-03-122390-7
Authors

Botacin, Marcus, Grégio, André

X Demographics

X Demographics

The data shown below were collected from the profiles of 4 X users who shared this research output. Click here to find out more about how the information was compiled.