↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Mirrored Commitment: Fixing “Randomized Partial Checking” and Applications
  3. Altmetric Badge
    Chapter 2 Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor Signatures
  4. Altmetric Badge
    Chapter 3 Programmable Payment Channels
  5. Altmetric Badge
    Chapter 4 Fair Private Set Intersection Using Smart Contracts
  6. Altmetric Badge
    Chapter 5 Powers-of-Tau to the People: Decentralizing Setup Ceremonies
  7. Altmetric Badge
    Chapter 6 Self-sovereign Identity for Electric Vehicle Charging
  8. Altmetric Badge
    Chapter 7 “Hello? Is There Anybody in There?” Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure
  9. Altmetric Badge
    Chapter 8 Security Analysis of BigBlueButton and eduMEET
  10. Altmetric Badge
    Chapter 9 An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation
  11. Altmetric Badge
    Chapter 10 ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security
  12. Altmetric Badge
    Chapter 11 A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer
  13. Altmetric Badge
    Chapter 12 A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation
  14. Altmetric Badge
    Chapter 13 Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions
  15. Altmetric Badge
    Chapter 14 Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48
  16. Altmetric Badge
    Chapter 15 How Users Investigate Phishing Emails that Lack Traditional Phishing Cues
  17. Altmetric Badge
    Chapter 16 Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures
  18. Altmetric Badge
    Chapter 17 Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps
Attention for Chapter 10: ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
6 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
ProvIoT : Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security
Chapter number 10
Book title
Applied Cryptography and Network Security
Published by
Springer, Cham, January 2024
DOI 10.1007/978-3-031-54776-8_10
Book ISBNs
978-3-03-154775-1, 978-3-03-154776-8
Authors

Mukherjee, Kunal, Wiedemeier, Joshua, Wang, Qi, Kamimura, Junpei, Rhee, John Junghwan, Wei, James, Li, Zhichun, Yu, Xiao, Tang, Lu-An, Gui, Jiaping, Jee, Kangkook

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 6 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 6 100%

Demographic breakdown

Readers by professional status Count As %
Unspecified 4 67%
Student > Master 1 17%
Unknown 1 17%
Readers by discipline Count As %
Unspecified 4 67%
Computer Science 1 17%
Unknown 1 17%