↓ Skip to main content

Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings

Overview of attention for book
Cover of 'Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems
  3. Altmetric Badge
    Chapter 2 Security Analysis of a Design Variant of Randomized Hashing
  4. Altmetric Badge
    Chapter 3 Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
  5. Altmetric Badge
    Chapter 4 An Efficient Non-transferable Proxy Re-encryption Scheme
  6. Altmetric Badge
    Chapter 5 Rounding Technique’s Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
  7. Altmetric Badge
    Chapter 6 On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES
  8. Altmetric Badge
    Chapter 7 Private Distributed Three-Party Learning of Gaussian Mixture Models
  9. Altmetric Badge
    Chapter 8 A Privacy Preserving Platform for MapReduce
  10. Altmetric Badge
    Chapter 9 Privacy-Preserving Deep Learning: Revisited and Enhanced
  11. Altmetric Badge
    Chapter 10 Characterizing Promotional Attacks in Mobile App Store
  12. Altmetric Badge
    Chapter 11 Low-Data Complexity Attacks on Camellia
  13. Altmetric Badge
    Chapter 12 RESTful Is Not Secure
  14. Altmetric Badge
    Chapter 13 UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space
  15. Altmetric Badge
    Chapter 14 A Hybrid Approach for Malware Family Classification
  16. Altmetric Badge
    Chapter 15 Low-Complexity Signature-Based Malware Detection for IoT Devices
  17. Altmetric Badge
    Chapter 16 De-anonymous and Anonymous Technologies for Network Traffic Release
  18. Altmetric Badge
    Chapter 17 Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
  19. Altmetric Badge
    Chapter 18 On the Effectiveness of Non-readable Executable Memory Against BROP
Attention for Chapter 2: Security Analysis of a Design Variant of Randomized Hashing
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Security Analysis of a Design Variant of Randomized Hashing
Chapter number 2
Book title
Applications and Techniques in Information Security
Published by
Springer, Singapore, July 2017
DOI 10.1007/978-981-10-5421-1_2
Book ISBNs
978-9-81-105420-4, 978-9-81-105421-1
Authors

Praveen Gauravaram, Shoichi Hirose, Douglas Stebila

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 33%
Lecturer 1 33%
Unknown 1 33%
Readers by discipline Count As %
Mathematics 1 33%
Engineering 1 33%
Unknown 1 33%