↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Impacts of Security Protocols on Real-Time Multimedia Communications
  3. Altmetric Badge
    Chapter 2 An Improvement on Privacy and Authentication in GSM
  4. Altmetric Badge
    Chapter 3 Encrypted Watermarks and Linux Laptop Security
  5. Altmetric Badge
    Chapter 4 Inconsistency Detection of Authorization Policies in Distributed Component Environment
  6. Altmetric Badge
    Chapter 5 Custodian-Hiding Verifiable Encryption
  7. Altmetric Badge
    Chapter 6 Proving Key Usage
  8. Altmetric Badge
    Chapter 7 Public Key Encryption with Conjunctive Field Keyword Search
  9. Altmetric Badge
    Chapter 8 A Probabilistic Method for Detecting Anomalous Program Behavior
  10. Altmetric Badge
    Chapter 9 Service Discrimination and Audit File Reduction for Effective Intrusion Detection
  11. Altmetric Badge
    Chapter 10 IDS False Alarm Filtering Using KNN Classifier
  12. Altmetric Badge
    Chapter 11 Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
  13. Altmetric Badge
    Chapter 12 Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment
  14. Altmetric Badge
    Chapter 13 Efficient Authenticated Key Agreement Protocol for Dynamic Groups
  15. Altmetric Badge
    Chapter 14 A Ring Signature Scheme Using Bilinear Pairings
  16. Altmetric Badge
    Chapter 15 Verifiable Pairing and Its Applications
  17. Altmetric Badge
    Chapter 16 Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading
  18. Altmetric Badge
    Chapter 17 An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks
  19. Altmetric Badge
    Chapter 18 Application of Content Computing in Honeyfarm
  20. Altmetric Badge
    Chapter 19 License Protection with a Tamper-Resistant Token
  21. Altmetric Badge
    Chapter 20 An Adaptive Approach to Hardware Alteration for Digital Rights Management
  22. Altmetric Badge
    Chapter 21 Dynamic Fingerprinting over Broadcast Using Revocation Scheme
  23. Altmetric Badge
    Chapter 22 Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels
  24. Altmetric Badge
    Chapter 23 Vulnerability of a Mobile Payment System Proposed at WISA 2002
  25. Altmetric Badge
    Chapter 24 Fair Offline Payment Using Verifiable Encryption
  26. Altmetric Badge
    Chapter 25 A Limited-Used Key Generation Scheme for Internet Transactions
  27. Altmetric Badge
    Chapter 26 Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes
  28. Altmetric Badge
    Chapter 27 Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II
  29. Altmetric Badge
    Chapter 28 Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
  30. Altmetric Badge
    Chapter 29 Hyperelliptic Curve Coprocessors on a FPGA
  31. Altmetric Badge
    Chapter 30 Key-Exchange Protocol Using Pre-agreed Session-ID
  32. Altmetric Badge
    Chapter 31 A New k-Anonymous Message Transmission Protocol
  33. Altmetric Badge
    Chapter 32 Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack
  34. Altmetric Badge
    Chapter 33 Side Channel Cryptanalysis on SEED
  35. Altmetric Badge
    Chapter 34 Secure and Efficient AES Software Implementation for Smart Cards
  36. Altmetric Badge
    Chapter 35 Practical Template Attacks
  37. Altmetric Badge
    Chapter 36 Evaluation and Improvement of the Tempest Fonts
Attention for Chapter 35: Practical Template Attacks
Altmetric Badge

Mentioned by

patent
2 patents

Citations

dimensions_citation
23 Dimensions

Readers on

mendeley
78 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Practical Template Attacks
Chapter number 35
Book title
Information Security Applications
Published by
Springer, Berlin, Heidelberg, August 2004
DOI 10.1007/978-3-540-31815-6_35
Book ISBNs
978-3-54-024015-0, 978-3-54-031815-6
Authors

Christian Rechberger, Elisabeth Oswald, Rechberger, Christian, Oswald, Elisabeth

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 78 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 1 1%
Switzerland 1 1%
Unknown 76 97%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 21 27%
Student > Master 11 14%
Researcher 10 13%
Student > Doctoral Student 5 6%
Student > Bachelor 3 4%
Other 13 17%
Unknown 15 19%
Readers by discipline Count As %
Computer Science 41 53%
Engineering 17 22%
Mathematics 2 3%
Unspecified 1 1%
Chemistry 1 1%
Other 1 1%
Unknown 15 19%