↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Real-Time Intruder Tracing through Self-Replication
  3. Altmetric Badge
    Chapter 2 On the Difficulty of Protecting Private Keys in Software
  4. Altmetric Badge
    Chapter 3 Intrusion Detection with Support Vector Machines and Generative Models
  5. Altmetric Badge
    Chapter 4 Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI
  6. Altmetric Badge
    Chapter 5 Fast Software Implementations of SC2000
  7. Altmetric Badge
    Chapter 6 Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512
  8. Altmetric Badge
    Chapter 7 Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG
  9. Altmetric Badge
    Chapter 8 Role-Based Access Control for E-commerce Sea-of-Data Applications
  10. Altmetric Badge
    Chapter 9 An Access Control Model for Tree Data Structures
  11. Altmetric Badge
    Chapter 10 A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI
  12. Altmetric Badge
    Chapter 11 Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks
  13. Altmetric Badge
    Chapter 12 Quantifying Privacy Leakage through Answering Database Queries
  14. Altmetric Badge
    Chapter 13 A New Offiine Privacy Protecting E-cash System with Revokable Anonymity
  15. Altmetric Badge
    Chapter 14 Receipt-Free Sealed-Bid Auction
  16. Altmetric Badge
    Chapter 15 Exclusion-Freeness in Multi-party Exchange Protocols
  17. Altmetric Badge
    Chapter 16 A Realistic Protocol for Multi-party Certified Electronic Mail
  18. Altmetric Badge
    Chapter 17 A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification
  19. Altmetric Badge
    Chapter 18 Comments to the UNCITRAL Model Law on Electronic Signatures
  20. Altmetric Badge
    Chapter 19 An Anonymous Loan System Based on Group Signature Scheme
  21. Altmetric Badge
    Chapter 20 Traceability Schemes for Signed Documents *
  22. Altmetric Badge
    Chapter 21 Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications
  23. Altmetric Badge
    Chapter 22 Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2 m )
  24. Altmetric Badge
    Chapter 23 Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2 m )
  25. Altmetric Badge
    Chapter 24 Conditional Cryptographic Delegation for P2P Data Sharing
  26. Altmetric Badge
    Chapter 25 Certification of Public Keys within an Identity Based System
  27. Altmetric Badge
    Chapter 26 A New Public Key Cryptosystem for Constrained Hardware
  28. Altmetric Badge
    Chapter 27 A Distributed and Computationally Secure Key Distribution Scheme *
  29. Altmetric Badge
    Chapter 28 On Optimal Hash Tree Traversal for Interval Time-Stamping
  30. Altmetric Badge
    Chapter 29 An Efficient Dynamic and Distributed Cryptographic Accumulator *
  31. Altmetric Badge
    Chapter 30 A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks
  32. Altmetric Badge
    Chapter 31 Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks
  33. Altmetric Badge
    Chapter 32 Automated Analysis of Some Security Mechanisms of SCEP *
  34. Altmetric Badge
    Chapter 33 An Attack on a Protocol for Certified Delivery
  35. Altmetric Badge
    Chapter 34 Oblivious Counter and Majority Protocol
  36. Altmetric Badge
    Chapter 35 Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network
  37. Altmetric Badge
    Chapter 36 Fingerprinting Concatenated Codes with Efficient Identification
  38. Altmetric Badge
    Chapter 37 A Provably Secure Additive and Multiplicative Privacy Homomorphism *
  39. Altmetric Badge
    Chapter 38 Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
patent
2 patents
wikipedia
1 Wikipedia page

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
11 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security
Published by
Springer-Verlag., January 2002
DOI 10.1007/3-540-45811-5
ISBNs
978-3-54-044270-7, 978-3-54-045811-1
Editors

Agnes Hui Chan, Virgil Gligor

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 11 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
South Africa 1 9%
Unknown 10 91%

Demographic breakdown

Readers by professional status Count As %
Student > Master 3 27%
Student > Doctoral Student 2 18%
Unspecified 1 9%
Other 1 9%
Student > Bachelor 1 9%
Other 1 9%
Unknown 2 18%
Readers by discipline Count As %
Computer Science 6 55%
Unspecified 1 9%
Business, Management and Accounting 1 9%
Engineering 1 9%
Unknown 2 18%