↓ Skip to main content

Information Security and Cryptology – ICISC 2004

Overview of attention for book
Cover of 'Information Security and Cryptology – ICISC 2004'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Security by, and for, Converged Mobile Devices
  3. Altmetric Badge
    Chapter 2 Security for Ubiquitous Computing
  4. Altmetric Badge
    Chapter 3 Algebraic Attacks on Combiners with Memory and Several Outputs
  5. Altmetric Badge
    Chapter 4 New Method for Bounding the Maximum Differential Probability for SPNs and ARIA
  6. Altmetric Badge
    Chapter 5 Dragon: A Fast Word Based Stream Cipher
  7. Altmetric Badge
    Chapter 6 An Efficient and Verifiable Solution to the Millionaire Problem
  8. Altmetric Badge
    Chapter 7 All in the XL Family: Theory and Practice
  9. Altmetric Badge
    Chapter 8 Efficient Broadcast Encryption Using Multiple Interpolation Methods
  10. Altmetric Badge
    Chapter 9 On Private Scalar Product Computation for Privacy-Preserving Data Mining
  11. Altmetric Badge
    Chapter 10 Separable Implicit Certificate Revocation
  12. Altmetric Badge
    Chapter 11 Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation
  13. Altmetric Badge
    Chapter 12 Improvement on Ha-Moon Randomized Exponentiation Algorithm
  14. Altmetric Badge
    Chapter 13 Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields
  15. Altmetric Badge
    Chapter 14 On Subliminal Channels in Deterministic Signature Schemes
  16. Altmetric Badge
    Chapter 15 Threshold Entrusted Undeniable Signature
  17. Altmetric Badge
    Chapter 16 On the Security Models of (Threshold) Ring Signature Schemes
  18. Altmetric Badge
    Chapter 17 Identity Based Threshold Ring Signature
  19. Altmetric Badge
    Chapter 18 Batch Verifications with ID-Based Signatures
  20. Altmetric Badge
    Chapter 19 A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method
  21. Altmetric Badge
    Chapter 20 Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations
  22. Altmetric Badge
    Chapter 21 New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method
  23. Altmetric Badge
    Chapter 22 Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
  24. Altmetric Badge
    Chapter 23 On the Pseudorandomness of a Modification of KASUMI Type Permutations
  25. Altmetric Badge
    Chapter 24 Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
  26. Altmetric Badge
    Chapter 25 Padding Oracle Attacks on Multiple Modes of Operation
  27. Altmetric Badge
    Chapter 26 An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes
  28. Altmetric Badge
    Chapter 27 Identity-Based Access Control for Ad Hoc Groups
  29. Altmetric Badge
    Chapter 28 Mobile Mixing
  30. Altmetric Badge
    Chapter 29 A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems
  31. Altmetric Badge
    Chapter 30 ADWICE – Anomaly Detection with Real-Time Incremental Clustering
  32. Altmetric Badge
    Chapter 31 Steganography for Executables and Code Transformation Signatures
  33. Altmetric Badge
    Chapter 32 On Security Notions for Steganalysis
  34. Altmetric Badge
    Chapter 33 A Block Oriented Fingerprinting Scheme in Relational Database
  35. Altmetric Badge
    Chapter 34 A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis
  36. Altmetric Badge
    Chapter 35 Profile-Based 3D Face Registration and Recognition
Attention for Chapter 9: On Private Scalar Product Computation for Privacy-Preserving Data Mining
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
8 Dimensions

Readers on

mendeley
104 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
On Private Scalar Product Computation for Privacy-Preserving Data Mining
Chapter number 9
Book title
Information Security and Cryptology – ICISC 2004
Published by
Springer, Berlin, Heidelberg, December 2004
DOI 10.1007/11496618_9
Book ISBNs
978-3-54-026226-8, 978-3-54-032083-8
Authors

Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 104 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Korea, Republic of 1 <1%
Estonia 1 <1%
France 1 <1%
Unknown 101 97%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 24 23%
Researcher 14 13%
Student > Master 14 13%
Student > Bachelor 8 8%
Professor > Associate Professor 6 6%
Other 20 19%
Unknown 18 17%
Readers by discipline Count As %
Computer Science 68 65%
Engineering 7 7%
Mathematics 3 3%
Business, Management and Accounting 2 2%
Physics and Astronomy 2 2%
Other 3 3%
Unknown 19 18%