↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On the Effectiveness of Internal Patching Against File-Sharing Worms
  3. Altmetric Badge
    Chapter 2 Peeking Through the Cloud: DNS-Based Estimation and Its Applications
  4. Altmetric Badge
    Chapter 3 Pushback for Overlay Networks: Protecting Against Malicious Insiders
  5. Altmetric Badge
    Chapter 4 PPAA: Peer-to-Peer Anonymous Authentication
  6. Altmetric Badge
    Chapter 5 Generic Constructions of Stateful Public Key Encryption and Their Applications
  7. Altmetric Badge
    Chapter 6 Traceable and Retrievable Identity-Based Encryption
  8. Altmetric Badge
    Chapter 7 Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
  9. Altmetric Badge
    Chapter 8 Attacking Reduced Round SHA-256
  10. Altmetric Badge
    Chapter 9 Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
  11. Altmetric Badge
    Chapter 10 Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?
  12. Altmetric Badge
    Chapter 11 Replay Attack in a Fair Exchange Protocol
  13. Altmetric Badge
    Chapter 12 Improved Conditional E-Payments
  14. Altmetric Badge
    Chapter 13 Anonymity in Transferable E-cash
  15. Altmetric Badge
    Chapter 14 Generic Security-Amplifying Methods of Ordinary Digital Signatures
  16. Altmetric Badge
    Chapter 15 New Differential-Algebraic Attacks and Reparametrization of Rainbow
  17. Altmetric Badge
    Chapter 16 Trapdoor Sanitizable Signatures and Their Application to Content Protection
  18. Altmetric Badge
    Chapter 17 Multi-factor Authenticated Key Exchange
  19. Altmetric Badge
    Chapter 18 Repelling Detour Attack Against Onions with Re-encryption
  20. Altmetric Badge
    Chapter 19 Analysis of EAP-GPSK Authentication Protocol
  21. Altmetric Badge
    Chapter 20 Efficient Device Pairing Using “Human-Comparable” Synchronized Audiovisual Patterns
  22. Altmetric Badge
    Chapter 21 PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
  23. Altmetric Badge
    Chapter 22 An Authentication Scheme Based on the Twisted Conjugacy Problem
  24. Altmetric Badge
    Chapter 23 Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
  25. Altmetric Badge
    Chapter 24 A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation
  26. Altmetric Badge
    Chapter 25 On the Security of the CCM Encryption Mode and of a Slight Variant
  27. Altmetric Badge
    Chapter 26 wNAF * , an Efficient Left-to-Right Signed Digit Recoding Algorithm
  28. Altmetric Badge
    Chapter 27 A Very Compact “Perfectly Masked” S-Box for AES
  29. Altmetric Badge
    Chapter 28 Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
  30. Altmetric Badge
    Chapter 29 Traceable Privacy of Recent Provably-Secure RFID Protocols
  31. Altmetric Badge
    Chapter 30 The Security of EPC Gen2 Compliant RFID Protocols
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
9 patents
wikipedia
1 Wikipedia page

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
7 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
Springer, Berlin, Heidelberg, January 2008
DOI 10.1007/978-3-540-68914-0
ISBNs
978-3-54-068913-3, 978-3-54-068914-0
Editors

Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 7 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 7 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 29%
Professor > Associate Professor 1 14%
Researcher 1 14%
Student > Master 1 14%
Unknown 2 29%
Readers by discipline Count As %
Computer Science 4 57%
Mathematics 1 14%
Unknown 2 29%