↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Two-Server Password-Only Authenticated Key Exchange
  3. Altmetric Badge
    Chapter 2 Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
  4. Altmetric Badge
    Chapter 3 Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme
  5. Altmetric Badge
    Chapter 4 Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution
  6. Altmetric Badge
    Chapter 5 A Traitor Tracing Scheme Based on RSA for Fast Decryption
  7. Altmetric Badge
    Chapter 6 N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
  8. Altmetric Badge
    Chapter 7 Messin’ with Texas Deriving Mother’s Maiden Names Using Public Records
  9. Altmetric Badge
    Chapter 8 Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management
  10. Altmetric Badge
    Chapter 9 Searching for High-Value Rare Events with Uncheatable Grid Computing
  11. Altmetric Badge
    Chapter 10 Digital Signatures Do Not Guarantee Exclusive Ownership
  12. Altmetric Badge
    Chapter 11 Thompson’s Group and Public Key Cryptography
  13. Altmetric Badge
    Chapter 12 Rainbow, a New Multivariable Polynomial Signature Scheme
  14. Altmetric Badge
    Chapter 13 Badger – A Fast and Provably Secure MAC
  15. Altmetric Badge
    Chapter 14 IDS False Alarm Reduction Using Continuous and Discontinuous Patterns
  16. Altmetric Badge
    Chapter 15 Indexing Information for Data Forensics
  17. Altmetric Badge
    Chapter 16 Model Generalization and Its Implications on Intrusion Detection
  18. Altmetric Badge
    Chapter 17 Intrusion-Resilient Secure Channels
  19. Altmetric Badge
    Chapter 18 Optimal Asymmetric Encryption and Signature Paddings
  20. Altmetric Badge
    Chapter 19 Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
  21. Altmetric Badge
    Chapter 20 Identity Based Encryption Without Redundancy
  22. Altmetric Badge
    Chapter 21 OACerts: Oblivious Attribute Certificates
  23. Altmetric Badge
    Chapter 22 Dynamic k-Times Anonymous Authentication
  24. Altmetric Badge
    Chapter 23 Efficient Anonymous Roaming and Its Security Analysis
  25. Altmetric Badge
    Chapter 24 Quantifying Security in Hybrid Cellular Networks
  26. Altmetric Badge
    Chapter 25 Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications
  27. Altmetric Badge
    Chapter 26 Building Reliable Mix Networks with Fair Exchange
  28. Altmetric Badge
    Chapter 27 SCARE of the DES
  29. Altmetric Badge
    Chapter 28 Robust Key Extraction from Physical Uncloneable Functions
  30. Altmetric Badge
    Chapter 29 Efficient Constructions for One-Way Hash Chains
  31. Altmetric Badge
    Chapter 30 Privacy Preserving Keyword Searches on Remote Encrypted Data
  32. Altmetric Badge
    Chapter 31 An Efficient Solution to the Millionaires’ Problem Based on Homomorphic Encryption
  33. Altmetric Badge
    Chapter 32 Non-interactive Zero-Knowledge Arguments for Voting
  34. Altmetric Badge
    Chapter 33 Short Signature and Universal Designated Verifier Signature Without Random Oracles
  35. Altmetric Badge
    Chapter 34 Efficient Identity Based Ring Signature
  36. Altmetric Badge
    Chapter 35 New Signature Schemes with Coupons and Tight Reduction
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
6 X users
patent
8 patents
wikipedia
12 Wikipedia pages

Citations

dimensions_citation
7 Dimensions

Readers on

mendeley
43 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
Springer, Berlin, Heidelberg, January 2005
DOI 10.1007/b137093
ISBNs
978-3-54-026223-7, 978-3-54-031542-1
Editors

John Ioannidis, Angelos Keromytis, Moti Yung

X Demographics

X Demographics

The data shown below were collected from the profiles of 6 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 43 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 3 7%
Germany 2 5%
United States 1 2%
Canada 1 2%
Unknown 36 84%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 11 26%
Student > Master 8 19%
Researcher 6 14%
Professor > Associate Professor 4 9%
Professor 3 7%
Other 12 28%
Readers by discipline Count As %
Computer Science 35 81%
Mathematics 4 9%
Unspecified 3 7%
Medicine and Dentistry 1 2%
Engineering 1 2%
Other 0 0%