↓ Skip to main content

Trusted Systems

Overview of attention for book
Cover of 'Trusted Systems'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks
  3. Altmetric Badge
    Chapter 2 Design and Implementation of Document Access Control Model Based on Role and Security Policy
  4. Altmetric Badge
    Chapter 3 Towards High-Performance IPsec on Cavium OCTEON Platform
  5. Altmetric Badge
    Chapter 4 An Abstract Model of a Trusted Platform
  6. Altmetric Badge
    Chapter 5 Modeling TCG-Based Secure Systems with Colored Petri Nets
  7. Altmetric Badge
    Chapter 6 Information Flow Graph: An Approach to Identifying Covert Storage Channels
  8. Altmetric Badge
    Chapter 7 Trusted Subjects Configuration Based on TE Model in MLS Systems
  9. Altmetric Badge
    Chapter 8 Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol
  10. Altmetric Badge
    Chapter 9 Revocation of Direct Anonymous Attestation
  11. Altmetric Badge
    Chapter 10 Measuring Random Tests by Conditional Entropy and Optimal Execution Order
  12. Altmetric Badge
    Chapter 11 Leakage Resilient Strong Key-Insulated Signatures in Public Channel
  13. Altmetric Badge
    Chapter 12 Two-Head Dragon Protocol: Preventing Cloning of Signature Keys
  14. Altmetric Badge
    Chapter 13 Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing
  15. Altmetric Badge
    Chapter 14 Can Hand-Held Computers Still Be Better Smart Cards?
  16. Altmetric Badge
    Chapter 15 TruWalletM: Secure Web Authentication on Mobile Platforms
  17. Altmetric Badge
    Chapter 16 A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs
  18. Altmetric Badge
    Chapter 17 Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
  19. Altmetric Badge
    Chapter 18 An Emerging Threat: Eve Meets a Robot
  20. Altmetric Badge
    Chapter 19 On Leveraging Stochastic Models for Remote Attestation
  21. Altmetric Badge
    Chapter 20 Interoperable Remote Attestation for VPN Environments
  22. Altmetric Badge
    Chapter 21 A Novel Reputation Computing Model
  23. Altmetric Badge
    Chapter 22 acTvSM: A Dynamic Virtualization Platform for Enforcement of Application Integrity
  24. Altmetric Badge
    Chapter 23 Software, Vendors and Reputation: An Analysis of the Dilemma in Creating Secure Software
Attention for Chapter 17: Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
Altmetric Badge

About this Attention Score

  • Above-average Attention Score compared to outputs of the same age and source (55th percentile)

Mentioned by

twitter
2 X users

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
20 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
Chapter number 17
Book title
Trusted Systems
Published in
Lecture notes in computer science, December 2010
DOI 10.1007/978-3-642-25283-9_17
Book ISBNs
978-3-64-225282-2, 978-3-64-225283-9
Authors

Jean-François Gallais, Johann Großschädl, Neil Hanley, Markus Kasper, Marcel Medwed, Francesco Regazzoni, Jörn-Marc Schmidt, Stefan Tillich, Marcin Wójcik, Jean-François Gallais, Johann Großschädl, Jörn-Marc Schmidt, Marcin Wójcik

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 20 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Korea, Republic of 1 5%
Netherlands 1 5%
United States 1 5%
Unknown 17 85%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 50%
Other 3 15%
Student > Master 3 15%
Researcher 2 10%
Student > Doctoral Student 1 5%
Other 0 0%
Unknown 1 5%
Readers by discipline Count As %
Computer Science 10 50%
Engineering 8 40%
Unknown 2 10%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 2. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 12 September 2013.
All research outputs
#14,177,097
of 22,721,584 outputs
Outputs from Lecture notes in computer science
#4,307
of 8,125 outputs
Outputs of similar age
#136,830
of 180,612 outputs
Outputs of similar age from Lecture notes in computer science
#140
of 321 outputs
Altmetric has tracked 22,721,584 research outputs across all sources so far. This one is in the 35th percentile – i.e., 35% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,125 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 44th percentile – i.e., 44% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 180,612 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 23rd percentile – i.e., 23% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 321 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 55% of its contemporaries.