↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 ADAM: Automated Detection and Attribution of Malicious Webpages
  3. Altmetric Badge
    Chapter 2 Detection of Heap-Spraying Attacks Using String Trace Graph
  4. Altmetric Badge
    Chapter 3 A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin
  5. Altmetric Badge
    Chapter 4 Before Unrooting your Android Phone, Patching up Permission System First!
  6. Altmetric Badge
    Chapter 5 I’ve Got Your Number:
  7. Altmetric Badge
    Chapter 6 Analyzing Unnecessary Permissions Requested by Android Apps Based on Users’ Opinions
  8. Altmetric Badge
    Chapter 7 Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage
  9. Altmetric Badge
    Chapter 8 Analyzing Security of Korean USIM-Based PKI Certificate Service
  10. Altmetric Badge
    Chapter 9 AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification
  11. Altmetric Badge
    Chapter 10 Systematically Breaking Online WYSIWYG Editors
  12. Altmetric Badge
    Chapter 11 New Integrated Long-Term Glimpse of RC4
  13. Altmetric Badge
    Chapter 12 Improved Modular Multiplication for Optimal Prime Fields
  14. Altmetric Badge
    Chapter 13 Context Based Smart Access Control on BYOD Environments
  15. Altmetric Badge
    Chapter 14 Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing
  16. Altmetric Badge
    Chapter 15 SecaaS Framework and Architecture: A Design of Dynamic Packet Control
  17. Altmetric Badge
    Chapter 16 Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction
  18. Altmetric Badge
    Chapter 17 A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks
  19. Altmetric Badge
    Chapter 18 Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing Property
  20. Altmetric Badge
    Chapter 19 Fair Multi-signature
  21. Altmetric Badge
    Chapter 20 An Efficient Variant of Boneh-Gentry-Hamburg’s Identity-Based Encryption Without Pairing
  22. Altmetric Badge
    Chapter 21 Joint Signature and Encryption in the Presence of Continual Leakage
  23. Altmetric Badge
    Chapter 22 Wireless Key Exchange Using Frequency Impairments
  24. Altmetric Badge
    Chapter 23 Exploiting the Potential of GPUs for Modular Multiplication in ECC
  25. Altmetric Badge
    Chapter 24 The Unified Hardware Design for GCM and SGCM
  26. Altmetric Badge
    Chapter 25 Successful Profiling Attacks with Different Measurement Environments for Each Phase
  27. Altmetric Badge
    Chapter 26 Function Masking: A New Countermeasure Against Side Channel Attack
  28. Altmetric Badge
    Chapter 27 Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System
  29. Altmetric Badge
    Chapter 28 Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network
  30. Altmetric Badge
    Chapter 29 Defining Security Primitives for Eliciting Flexible Attack Scenarios Through CAPEC Analysis
  31. Altmetric Badge
    Chapter 30 Advanced Security Assessment for Control Effectiveness
  32. Altmetric Badge
    Chapter 31 Study on the Effectiveness of the Security Countermeasures Against Spear Phishing
Attention for Chapter 14: Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing
Altmetric Badge

Mentioned by

patent
2 patents

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
20 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing
Chapter number 14
Book title
Information Security Applications
Published by
Springer, Cham, August 2014
DOI 10.1007/978-3-319-15087-1_14
Book ISBNs
978-3-31-915086-4, 978-3-31-915087-1
Authors

Chao-Lieh Chen, Shen-Chien Chen, Chun-Ruei Chang, Chia-Fei Lin, Chen, Chao-Lieh, Chen, Shen-Chien, Chang, Chun-Ruei, Lin, Chia-Fei

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 20 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 20 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 5 25%
Student > Ph. D. Student 5 25%
Researcher 3 15%
Lecturer 1 5%
Other 1 5%
Other 3 15%
Unknown 2 10%
Readers by discipline Count As %
Computer Science 17 85%
Physics and Astronomy 1 5%
Unknown 2 10%