↓ Skip to main content

Information Security and Cryptology — ICISC 2002 : 5th International Conference Seoul, Korea, November 28–29, 2002 Revised Papers

Overview of attention for book
Cover of 'Information Security and Cryptology — ICISC 2002 : 5th International Conference Seoul, Korea, November 28–29, 2002 Revised Papers'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Cut-&-Paste Attacks with JAVA
  3. Altmetric Badge
    Chapter 2 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption
  4. Altmetric Badge
    Chapter 3 New DSA-Verifiable Signcryption Schemes
  5. Altmetric Badge
    Chapter 4 Convertible Group Undeniable Signatures
  6. Altmetric Badge
    Chapter 5 An Efficient Fail-Stop Signature Scheme Based on Factorization
  7. Altmetric Badge
    Chapter 6 On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme
  8. Altmetric Badge
    Chapter 7 System Specification Based Network Modeling for Survivability Testing Simulation
  9. Altmetric Badge
    Chapter 8 A Risk-Sensitive Intrusion Detection Model
  10. Altmetric Badge
    Chapter 9 Applet Verification Strategies for RAM-Constrained Devices
  11. Altmetric Badge
    Chapter 10 Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks
  12. Altmetric Badge
    Chapter 11 Consistent Differential Patterns of Rijndael
  13. Altmetric Badge
    Chapter 12 Hardware Design and Analysis of Block Cipher Components
  14. Altmetric Badge
    Chapter 13 Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
  15. Altmetric Badge
    Chapter 14 On the Efficiency of the Clock Control Guessing Attack
  16. Altmetric Badge
    Chapter 15 Balanced Shrinking Generators
  17. Altmetric Badge
    Chapter 16 On the Universal Hash Functions in Luby-Rackoff Cipher
  18. Altmetric Badge
    Chapter 17 Threshold MACs
  19. Altmetric Badge
    Chapter 18 Ideal Threshold Schemes from MDS Codes
  20. Altmetric Badge
    Chapter 19 New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms
  21. Altmetric Badge
    Chapter 20 Efficient Computations of the Tate Pairing for the Large MOV Degrees
  22. Altmetric Badge
    Chapter 21 Improved Techniques for Fast Exponentiation
  23. Altmetric Badge
    Chapter 22 Efficient Hardware Multiplicative Inverters
  24. Altmetric Badge
    Chapter 23 Ways to Enhance Differential Power Analysis
  25. Altmetric Badge
    Chapter 24 A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion
  26. Altmetric Badge
    Chapter 25 A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem
  27. Altmetric Badge
    Chapter 26 Hardware Fault Attack on RSA with CRT Revisited
  28. Altmetric Badge
    Chapter 27 Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer
  29. Altmetric Badge
    Chapter 28 Non-interactive Auction Scheme with Strong Privacy
  30. Altmetric Badge
    Chapter 29 An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control
  31. Altmetric Badge
    Chapter 30 Speeding Up Secure Sessions Establishment on the Internet
  32. Altmetric Badge
    Chapter 31 On Fairness in Exchange Protocols
  33. Altmetric Badge
    Chapter 32 A Model for Embedding and Authorizing Digital Signatures in Printed Documents
  34. Altmetric Badge
    Chapter 33 A Dynamic Group Key Distribution Scheme with Flexible User Join
  35. Altmetric Badge
    Chapter 34 Efficient Multicast Key Management for Stateless Receivers
  36. Altmetric Badge
    Chapter 35 Fingerprint Verification System Involving Smart Card
  37. Altmetric Badge
    Chapter 36 A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
3 patents
wikipedia
1 Wikipedia page

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
7 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Cryptology — ICISC 2002 : 5th International Conference Seoul, Korea, November 28–29, 2002 Revised Papers
Published by
Springer Berlin Heidelberg, July 2003
DOI 10.1007/3-540-36552-4
ISBNs
978-3-54-000716-6, 978-3-54-036552-5
Editors

Lee, Pil Joong, Lim, Chae Hoon

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 7 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 1 14%
Unknown 6 86%

Demographic breakdown

Readers by professional status Count As %
Researcher 2 29%
Student > Ph. D. Student 1 14%
Student > Bachelor 1 14%
Professor > Associate Professor 1 14%
Unknown 2 29%
Readers by discipline Count As %
Computer Science 3 43%
Mathematics 1 14%
Chemistry 1 14%
Unknown 2 29%