↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Minimizing the use of random oracles in authenticated encryption schemes
  3. Altmetric Badge
    Chapter 2 Zero-knowledge proofs of decision power: New protocols and optimal round-complexity
  4. Altmetric Badge
    Chapter 3 Computational learning theoreitc cryptanalysis of language theoretic cryptosystems
  5. Altmetric Badge
    Chapter 4 A language for specifying sequences of authorization transformations and its applications
  6. Altmetric Badge
    Chapter 5 Information and Communications Security
  7. Altmetric Badge
    Chapter 6 Traceable visual cryptography
  8. Altmetric Badge
    Chapter 7 Remarks on the multiple assignment secret sharing scheme
  9. Altmetric Badge
    Chapter 8 Secret sharing in hierarchical groups
  10. Altmetric Badge
    Chapter 9 Stateless connections
  11. Altmetric Badge
    Chapter 10 Design of a security platform for CORBA based application
  12. Altmetric Badge
    Chapter 11 Secure document management and distribution in an open network environment
  13. Altmetric Badge
    Chapter 12 A2-code = Affine resolvable + BIBD
  14. Altmetric Badge
    Chapter 13 Multisender authentication systems with unconditional security
  15. Altmetric Badge
    Chapter 14 Proposal of user identification scheme using mouse
  16. Altmetric Badge
    Chapter 15 An effective genetic algorithm for finding highly nonlinear boolean functions
  17. Altmetric Badge
    Chapter 16 Duality of Boolean functions and its cryptographic significance
  18. Altmetric Badge
    Chapter 17 Construction of correlation immune Boolean functions
  19. Altmetric Badge
    Chapter 18 An improved key stream generator based on the programmable cellular automata
  20. Altmetric Badge
    Chapter 19 A trust policy framework
  21. Altmetric Badge
    Chapter 20 Critical analysis of security in voice hiding techniques
  22. Altmetric Badge
    Chapter 21 Two efficient RSA multisignature schemes
  23. Altmetric Badge
    Chapter 22 Proxy signatures, revisited
  24. Altmetric Badge
    Chapter 23 Information and Communications Security
  25. Altmetric Badge
    Chapter 24 A multiplication-addition structure against differential attack
  26. Altmetric Badge
    Chapter 25 On strict estimation method of provable security against differential and linear cryptanalysis
  27. Altmetric Badge
    Chapter 26 Improved fast software implementation of block ciphers (Extended abstract)
  28. Altmetric Badge
    Chapter 27 Security comments on the Hwang-Chen algebraic-code cryptosystem
  29. Altmetric Badge
    Chapter 28 Efficient elliptic curve exponentiation
  30. Altmetric Badge
    Chapter 29 Efficient construction of secure hyperelliptic discrete logarithm problems
  31. Altmetric Badge
    Chapter 30 A new and optimal chosen-message attack on RSA-type cryptosystems
  32. Altmetric Badge
    Chapter 31 On weak RSA-keys produced from pretty good privacy
  33. Altmetric Badge
    Chapter 32 Self-synchronized message randomization methods for subliminal channels
  34. Altmetric Badge
    Chapter 33 Hiding the hidden: A software system for concealing ciphertext as innocuous text
  35. Altmetric Badge
    Chapter 34 Digital signature and public key cryptosystem in a prime order subgroup of Zn*
  36. Altmetric Badge
    Chapter 35 Trapdoor one-way permutations and multivariate polynomials
  37. Altmetric Badge
    Chapter 36 Asymmetric cryptography with S-Boxes Is it easier than expected to design efficient asymmetric cryptosystems?
  38. Altmetric Badge
    Chapter 37 On the powerline system
  39. Altmetric Badge
    Chapter 38 Making unfair a “Fair” blind signature scheme
  40. Altmetric Badge
    Chapter 39 Enforcing traceability in software
  41. Altmetric Badge
    Chapter 40 Publicly verifiable partial key escrow
  42. Altmetric Badge
    Chapter 41 A secure code for recipient watermarking against conspiracy attacks by all users
  43. Altmetric Badge
    Chapter 42 Protocols for Issuing public-key certificates over the Internet
  44. Altmetric Badge
    Chapter 43 Distributed cryptographic function application protocols
  45. Altmetric Badge
    Chapter 44 Fault tolerant anonymous channel
  46. Altmetric Badge
    Chapter 45 An Implementable scheme for secure delegation of computing and data
  47. Altmetric Badge
    Chapter 46 Electronic commerce with secure intelligent trade agents
  48. Altmetric Badge
    Chapter 47 Efficient scalable fair cash with off-line extortion prevention
  49. Altmetric Badge
    Chapter 48 An anonymous and undeniable payment scheme
Attention for Chapter 23: Information and Communications Security
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age and source

Mentioned by

wikipedia
8 Wikipedia pages

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
61 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Information and Communications Security
Chapter number 23
Book title
Information and Communications Security
Published in
Lecture notes in computer science, January 1997
DOI 10.1007/bfb0028479
Book ISBNs
978-3-54-063696-0, 978-3-54-069628-5
Authors

John Kelsey, Bruce Schneier, David Wagner, Kelsey, John, Schneier, Bruce, Wagner, David

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 61 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 2%
Spain 1 2%
Switzerland 1 2%
Unknown 58 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 18 30%
Student > Master 15 25%
Researcher 5 8%
Professor 4 7%
Student > Doctoral Student 3 5%
Other 9 15%
Unknown 7 11%
Readers by discipline Count As %
Computer Science 45 74%
Engineering 4 7%
Mathematics 3 5%
Physics and Astronomy 1 2%
Arts and Humanities 1 2%
Other 0 0%
Unknown 7 11%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 08 March 2024.
All research outputs
#7,452,489
of 22,783,848 outputs
Outputs from Lecture notes in computer science
#2,485
of 8,124 outputs
Outputs of similar age
#19,753
of 91,525 outputs
Outputs of similar age from Lecture notes in computer science
#9
of 20 outputs
Altmetric has tracked 22,783,848 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,124 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 55% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 91,525 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 19th percentile – i.e., 19% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 20 others from the same source and published within six weeks on either side of this one. This one is in the 40th percentile – i.e., 40% of its contemporaries scored the same or lower than it.