↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Few Thoughts on E-Commerce
  3. Altmetric Badge
    Chapter 2 New CBC-MAC Forgery Attacks
  4. Altmetric Badge
    Chapter 3 Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
  5. Altmetric Badge
    Chapter 4 Improved Cryptanalysis of the Self-Shrinking Generator
  6. Altmetric Badge
    Chapter 5 Attacks Based on Small Factors in Various Group Structures
  7. Altmetric Badge
    Chapter 6 On Classifying Conference Key Distribution Protocols
  8. Altmetric Badge
    Chapter 7 Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI
  9. Altmetric Badge
    Chapter 8 New Public-Key Cryptosystem Using Divisor Class Groups
  10. Altmetric Badge
    Chapter 9 First Implementation of Cryptographic Protocols Based on Algebraic Number Fields
  11. Altmetric Badge
    Chapter 10 Practical Key Recovery Schemes
  12. Altmetric Badge
    Chapter 11 Non-deterministic Processors
  13. Altmetric Badge
    Chapter 12 Personal Secure Booting
  14. Altmetric Badge
    Chapter 13 Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules
  15. Altmetric Badge
    Chapter 14 A Strategy for MLS Workflow
  16. Altmetric Badge
    Chapter 15 Condition-Driven Integration of Security Services
  17. Altmetric Badge
    Chapter 16 SKETHIC: Secure Kernel Extension against Trojan Horses with Informat ion-Carrying Codes
  18. Altmetric Badge
    Chapter 17 Secure and Private Distribution of Online Video and Some Related Cryptographic Issues
  19. Altmetric Badge
    Chapter 18 Private Information Retrieval Based on the Subgroup Membership Problem
  20. Altmetric Badge
    Chapter 19 A Practical English Auction with One-Time Registration
  21. Altmetric Badge
    Chapter 20 A User Authentication Scheme with Identity and Location Privacy
  22. Altmetric Badge
    Chapter 21 An End-to-End Authentication Protocol in Wireless Application Protocol
  23. Altmetric Badge
    Chapter 22 Error Detection and Authentication in Quantum Key Distribution
  24. Altmetric Badge
    Chapter 23 An Axiomatic Basis for Reasoning about Trust in PKIs
  25. Altmetric Badge
    Chapter 24 A Knowledge-Based Approach to Internet Authorizations
  26. Altmetric Badge
    Chapter 25 Applications of Trusted Review to Information Security
  27. Altmetric Badge
    Chapter 26 Network Security Modeling and Cyber Attack Simulation Methodology
  28. Altmetric Badge
    Chapter 27 Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
  29. Altmetric Badge
    Chapter 28 Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS
  30. Altmetric Badge
    Chapter 29 Improving the Availability of Time-Stamping Services
  31. Altmetric Badge
    Chapter 30 Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
  32. Altmetric Badge
    Chapter 31 Democratic Systems
  33. Altmetric Badge
    Chapter 32 Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
  34. Altmetric Badge
    Chapter 33 Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates
  35. Altmetric Badge
    Chapter 34 How to Construct Fail-Stop Confirmer Signature Schemes
  36. Altmetric Badge
    Chapter 35 Signature Schemes Based on 3rd Order Shift Registers
  37. Altmetric Badge
    Chapter 36 Anonymous Statistical Survey of Attributes
  38. Altmetric Badge
    Chapter 37 Secure Mobile Agent Using Strong Non-designated Proxy Signature
  39. Altmetric Badge
    Chapter 38 Elliptic Curve Based Password Authenticated Key Exchange Protocols
  40. Altmetric Badge
    Chapter 39 Elliptic Curve Cryptography on a Palm OS Device
  41. Altmetric Badge
    Chapter 40 Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field
Attention for Chapter 21: An End-to-End Authentication Protocol in Wireless Application Protocol
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
19 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
An End-to-End Authentication Protocol in Wireless Application Protocol
Chapter number 21
Book title
Information Security and Privacy
Published by
Springer Berlin Heidelberg, July 2001
DOI 10.1007/3-540-47719-5_21
Book ISBNs
978-3-54-042300-3, 978-3-54-047719-8
Authors

Jong -Phil Yang, Weon Shin, Kyung -Hyune Rhee

Editors

Vijay Varadharajan, Yi Mu

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 19 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 19 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 37%
Student > Master 4 21%
Researcher 2 11%
Professor 1 5%
Other 1 5%
Other 2 11%
Unknown 2 11%
Readers by discipline Count As %
Computer Science 16 84%
Physics and Astronomy 1 5%
Unknown 2 11%