↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Practical Authenticated Key Agreement Using Passwords
  3. Altmetric Badge
    Chapter 2 Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks
  4. Altmetric Badge
    Chapter 3 Storage-Efficient Stateless Group Key Revocation
  5. Altmetric Badge
    Chapter 4 Low-Level Ideal Signatures and General Integrity Idealization
  6. Altmetric Badge
    Chapter 5 Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA
  7. Altmetric Badge
    Chapter 6 How to Break and Repair a Universally Composable Signature Functionality
  8. Altmetric Badge
    Chapter 7 RSA Accumulator Based Broadcast Encryption
  9. Altmetric Badge
    Chapter 8 Chameleon Hashing Without Key Exposure
  10. Altmetric Badge
    Chapter 9 Radix-r Non-Adjacent Form
  11. Altmetric Badge
    Chapter 10 On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor
  12. Altmetric Badge
    Chapter 11 Security Analysis of Two Signcryption Schemes
  13. Altmetric Badge
    Chapter 12 On The Security of Key Derivation Functions
  14. Altmetric Badge
    Chapter 13 Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery
  15. Altmetric Badge
    Chapter 14 A Model for the Semantics of Attack Signatures in Misuse Detection Systems
  16. Altmetric Badge
    Chapter 15 Detection of Sniffers in an Ethernet Network
  17. Altmetric Badge
    Chapter 16 Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
  18. Altmetric Badge
    Chapter 17 Securing DBMS: Characterizing and Detecting Query Floods
  19. Altmetric Badge
    Chapter 18 An XML-Based Approach to Document Flow Verification
  20. Altmetric Badge
    Chapter 19 Model-Checking Access Control Policies
  21. Altmetric Badge
    Chapter 20 A Distributed High Assurance Reference Monitor
  22. Altmetric Badge
    Chapter 21 Using Mediated Identity-Based Cryptography to Support Role-Based Access Control
  23. Altmetric Badge
    Chapter 22 Towards Human Interactive Proofs in the Text-Domain
  24. Altmetric Badge
    Chapter 23 Image Recognition CAPTCHAs
  25. Altmetric Badge
    Chapter 24 A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model
  26. Altmetric Badge
    Chapter 25 Certificate Recommendations to Improve the Robustness of Web of Trust
  27. Altmetric Badge
    Chapter 26 Universally Composable Secure Mobile Agent Computation
  28. Altmetric Badge
    Chapter 27 Re-thinking Security in IP Based Micro-Mobility
  29. Altmetric Badge
    Chapter 28 Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group
  30. Altmetric Badge
    Chapter 29 Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions
  31. Altmetric Badge
    Chapter 30 Provable Unlinkability Against Traffic Analysis Already After $\mathcal{O}(\log(n))~$ Steps!
  32. Altmetric Badge
    Chapter 31 An Efficient Online Electronic Cash with Unlinkable Exact Payments
  33. Altmetric Badge
    Chapter 32 Modifiable Digital Content Protection in P2P
  34. Altmetric Badge
    Chapter 33 Survey on the Technological Aspects of Digital Rights Management
  35. Altmetric Badge
    Chapter 34 Detecting Software Theft via Whole Program Path Birthmarks
  36. Altmetric Badge
    Chapter 35 Effective Security Requirements Analysis: HAZOP and Use Cases
  37. Altmetric Badge
    Chapter 36 The Obfuscation Executive
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
2 X users
patent
4 patents

Readers on

mendeley
28 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security
Published by
Springer Science & Business Media, September 2004
DOI 10.1007/b100936
ISBNs
978-3-54-023208-7, 978-3-54-030144-8
Editors

Kan Zhang, Yuliang Zheng

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 28 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 2 7%
Turkey 1 4%
Belgium 1 4%
Unknown 24 86%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 36%
Professor 3 11%
Lecturer 1 4%
Other 1 4%
Student > Postgraduate 1 4%
Other 0 0%
Unknown 12 43%
Readers by discipline Count As %
Computer Science 15 54%
Engineering 1 4%
Unknown 12 43%