↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 One-Round Strong Oblivious Signature-Based Envelope
  3. Altmetric Badge
    Chapter 2 Proxy Signature with Revocation
  4. Altmetric Badge
    Chapter 3 On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
  5. Altmetric Badge
    Chapter 4 Content-Based Encryption
  6. Altmetric Badge
    Chapter 5 Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry
  7. Altmetric Badge
    Chapter 6 Identity-Based Group Encryption
  8. Altmetric Badge
    Chapter 7 Edit Distance Based Encryption and Its Application
  9. Altmetric Badge
    Chapter 8 Proxy Re-encryption with Delegatable Verifiability
  10. Altmetric Badge
    Chapter 9 Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions
  11. Altmetric Badge
    Chapter 10 Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage
  12. Altmetric Badge
    Chapter 11 Public Key Encryption with Authorized Keyword Search
  13. Altmetric Badge
    Chapter 12 Linear Encryption with Keyword Search
  14. Altmetric Badge
    Chapter 13 Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
  15. Altmetric Badge
    Chapter 14 Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
  16. Altmetric Badge
    Chapter 15 Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
  17. Altmetric Badge
    Chapter 16 A New Attack on Three Variants of the RSA Cryptosystem
  18. Altmetric Badge
    Chapter 17 Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
  19. Altmetric Badge
    Chapter 18 Deterministic Encoding into Twisted Edwards Curves
  20. Altmetric Badge
    Chapter 19 Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ
  21. Altmetric Badge
    Chapter 20 Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
  22. Altmetric Badge
    Chapter 21 Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework
  23. Altmetric Badge
    Chapter 22 Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)
  24. Altmetric Badge
    Chapter 23 Impossible Differential Cryptanalysis of 14-Round Camellia-192
  25. Altmetric Badge
    Chapter 24 Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
  26. Altmetric Badge
    Chapter 25 On the Security of the LAC Authenticated Encryption Algorithm
  27. Altmetric Badge
    Chapter 26 Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques
  28. Altmetric Badge
    Chapter 27 Reducing the Key Size of the SRP Encryption Scheme
  29. Altmetric Badge
    Chapter 28 Biometric Access Control with High Dimensional Facial Features
  30. Altmetric Badge
    Chapter 29 Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes
  31. Altmetric Badge
    Chapter 30 Interest Profiling for Security Monitoring and Forensic Investigation
  32. Altmetric Badge
    Chapter 31 Pseudonymous Signature on eIDAS Token – Implementation Based Privacy Threats
  33. Altmetric Badge
    Chapter 32 A Feasible No-Root Approach on Android
  34. Altmetric Badge
    Chapter 33 Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning
  35. Altmetric Badge
    Chapter 34 A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Privacy
Published by
Springer, Cham, January 2016
DOI 10.1007/978-3-319-40367-0
ISBNs
978-3-31-940366-3, 978-3-31-940367-0
Editors

Joseph K. Liu, Ron Steinfeld

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Researcher 1 25%
Student > Master 1 25%
Unknown 2 50%
Readers by discipline Count As %
Computer Science 2 50%
Unknown 2 50%