↓ Skip to main content

Financial Cryptography and Data Security

Overview of attention for book
Cover of 'Financial Cryptography and Data Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Fraud Within Asymmetric Multi-hop Cellular Networks
  3. Altmetric Badge
    Chapter 2 Protecting Secret Data from Insider Attacks
  4. Altmetric Badge
    Chapter 3 Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
  5. Altmetric Badge
    Chapter 4 Trust and Swindling on the Internet
  6. Altmetric Badge
    Chapter 5 Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)
  7. Altmetric Badge
    Chapter 6 Time Capsule Signature
  8. Altmetric Badge
    Chapter 7 Policy-Based Cryptography and Applications
  9. Altmetric Badge
    Chapter 8 A Chat at the Old Phishin’ Hole
  10. Altmetric Badge
    Chapter 9 Modeling and Preventing Phishing Attacks
  11. Altmetric Badge
    Chapter 10 Helping the Phish Detect the Lure
  12. Altmetric Badge
    Chapter 11 Who’d Phish from the Summit of Kilimanjaro?
  13. Altmetric Badge
    Chapter 12 A Privacy-Protecting Coupon System
  14. Altmetric Badge
    Chapter 13 Testing Disjointness of Private Datasets
  15. Altmetric Badge
    Chapter 14 RFID Traceability: A Multilayer Problem
  16. Altmetric Badge
    Chapter 15 Information-Theoretic Security Analysis of Physical Uncloneable Functions
  17. Altmetric Badge
    Chapter 16 Risk Assurance for Hedge Funds Using Zero Knowledge Proofs
  18. Altmetric Badge
    Chapter 17 Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
  19. Altmetric Badge
    Chapter 18 Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce
  20. Altmetric Badge
    Chapter 19 Securing Sensitive Data with the Ingrian DataSecure Platform
  21. Altmetric Badge
    Chapter 20 Ciphire Mail Email Encryption and Authentication
  22. Altmetric Badge
    Chapter 21 A User-Friendly Approach to Human Authentication of Messages
  23. Altmetric Badge
    Chapter 22 Approximate Message Authentication and Biometric Entity Authentication
  24. Altmetric Badge
    Chapter 23 Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model
  25. Altmetric Badge
    Chapter 24 Achieving Fairness in Private Contract Negotiation
  26. Altmetric Badge
    Chapter 25 Small Coalitions Cannot Manipulate Voting
  27. Altmetric Badge
    Chapter 26 Efficient Privacy-Preserving Protocols for Multi-unit Auctions
  28. Altmetric Badge
    Chapter 27 Event Driven Private Counters
  29. Altmetric Badge
    Chapter 28 Secure Distributed Human Computation
  30. Altmetric Badge
    Chapter 29 Secure Multi-attribute Procurement Auction
  31. Altmetric Badge
    Chapter 30 Audit File Reduction Using N-Gram Models
  32. Altmetric Badge
    Chapter 31 Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
  33. Altmetric Badge
    Chapter 32 Secure Biometric Authentication for Weak Computational Devices
  34. Altmetric Badge
    Chapter 33 Panel Summary: Incentives, Markets and Information Security
Attention for Chapter 2: Protecting Secret Data from Insider Attacks
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
27 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Protecting Secret Data from Insider Attacks
Chapter number 2
Book title
Financial Cryptography and Data Security
Published in
Lecture notes in computer science, January 2005
DOI 10.1007/11507840_2
Book ISBNs
978-3-54-026656-3, 978-3-54-031680-0
Authors

David Dagon, Wenke Lee, Richard Lipton

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 27 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 4%
Unknown 26 96%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 9 33%
Student > Master 7 26%
Researcher 3 11%
Professor 2 7%
Lecturer 1 4%
Other 3 11%
Unknown 2 7%
Readers by discipline Count As %
Computer Science 22 81%
Mathematics 1 4%
Business, Management and Accounting 1 4%
Physics and Astronomy 1 4%
Unknown 2 7%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 13 July 2013.
All research outputs
#18,341,711
of 22,714,025 outputs
Outputs from Lecture notes in computer science
#6,005
of 8,124 outputs
Outputs of similar age
#133,550
of 139,415 outputs
Outputs of similar age from Lecture notes in computer science
#109
of 132 outputs
Altmetric has tracked 22,714,025 research outputs across all sources so far. This one is in the 11th percentile – i.e., 11% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,124 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 14th percentile – i.e., 14% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 139,415 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 2nd percentile – i.e., 2% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 132 others from the same source and published within six weeks on either side of this one. This one is in the 11th percentile – i.e., 11% of its contemporaries scored the same or lower than it.