↓ Skip to main content

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems

Overview of attention for book
Cover of 'Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Recent Developments in Low-Level Software Security
  3. Altmetric Badge
    Chapter 2 Towards a C 2 I Platform for Combating the Cyber-Threat
  4. Altmetric Badge
    Chapter 3 Veracity, Plausibility, and Reputation
  5. Altmetric Badge
    Chapter 4 Another Fallen Hash-Based RFID Authentication Protocol
  6. Altmetric Badge
    Chapter 5 HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network
  7. Altmetric Badge
    Chapter 6 How to Break EAP-MD5
  8. Altmetric Badge
    Chapter 7 Privacy Preserving Social Network Publication on Bipartite Graphs
  9. Altmetric Badge
    Chapter 8 Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications
  10. Altmetric Badge
    Chapter 9 Privacy Preservation of User History Graph
  11. Altmetric Badge
    Chapter 10 HiPoLDS: A Security Policy Language for Distributed Systems
  12. Altmetric Badge
    Chapter 11 ROAC: A Role-Oriented Access Control Model
  13. Altmetric Badge
    Chapter 12 Optimal Parameters for Efficient Two-Party Computation Protocols
  14. Altmetric Badge
    Chapter 13 Assisting Server for Secure Multi-Party Computation
  15. Altmetric Badge
    Chapter 14 An Efficient Lattice-Based Secret Sharing Construction
  16. Altmetric Badge
    Chapter 15 On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems
  17. Altmetric Badge
    Chapter 16 Impossible Differential Cryptanalysis of Reduced-Round LBlock
  18. Altmetric Badge
    Chapter 17 Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
  19. Altmetric Badge
    Chapter 18 Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android
Attention for Chapter 15: On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems
Altmetric Badge

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
7 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems
Chapter number 15
Book title
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
Published by
Springer, Berlin, Heidelberg, June 2012
DOI 10.1007/978-3-642-30955-7_15
Book ISBNs
978-3-64-230954-0, 978-3-64-230955-7
Authors

Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 7 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 7 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 43%
Professor 1 14%
Other 1 14%
Student > Master 1 14%
Researcher 1 14%
Other 0 0%
Readers by discipline Count As %
Computer Science 6 86%
Mathematics 1 14%