↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE
  3. Altmetric Badge
    Chapter 2 Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1
  4. Altmetric Badge
    Chapter 3 Some Insights into Differential Cryptanalysis of Grain v1
  5. Altmetric Badge
    Chapter 4 On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations
  6. Altmetric Badge
    Chapter 5 Strongly Simulation-Extractable Leakage-Resilient NIZK
  7. Altmetric Badge
    Chapter 6 A Secure Three-Party Computational Protocol for Triangle Area
  8. Altmetric Badge
    Chapter 7 Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption
  9. Altmetric Badge
    Chapter 8 TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage
  10. Altmetric Badge
    Chapter 9 Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets
  11. Altmetric Badge
    Chapter 10 A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012
  12. Altmetric Badge
    Chapter 11 Further Research on N-1 Attack against Exponentiation Algorithms
  13. Altmetric Badge
    Chapter 12 Cryptanalysis of RSA with Multiple Small Secret Exponents
  14. Altmetric Badge
    Chapter 13 New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation
  15. Altmetric Badge
    Chapter 14 Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model
  16. Altmetric Badge
    Chapter 15 Incrementally Executable Signcryptions
  17. Altmetric Badge
    Chapter 16 Hierarchical Identity-Based Broadcast Encryption
  18. Altmetric Badge
    Chapter 17 Continuous After-the-Fact Leakage-Resilient Key Exchange
  19. Altmetric Badge
    Chapter 18 Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited
  20. Altmetric Badge
    Chapter 19 On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption
  21. Altmetric Badge
    Chapter 20 ELmE : A Misuse Resistant Parallel Authenticated Encryption
  22. Altmetric Badge
    Chapter 21 Lattice Decoding Attacks on Binary LWE
  23. Altmetric Badge
    Chapter 22 Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
  24. Altmetric Badge
    Chapter 23 Once Root Always a Threat: Analyzing the Security Threats of Android Permission System
  25. Altmetric Badge
    Chapter 24 A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission
  26. Altmetric Badge
    Chapter 25 Another Look at Privacy Threats in 3G Mobile Telephony
  27. Altmetric Badge
    Chapter 26 ExBLACR: Extending BLACR System
  28. Altmetric Badge
    Chapter 27 A Semantics-Aware Classification Approach for Data Leakage Prevention
  29. Altmetric Badge
    Chapter 28 Route 66: Passively Breaking All GSM Channels
  30. Altmetric Badge
    Chapter 29 An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones
  31. Altmetric Badge
    Chapter 30 Running Multiple Androids on One ARM Platform
  32. Altmetric Badge
    Chapter 31 CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android
  33. Altmetric Badge
    Chapter 32 Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2
Attention for Chapter 13: New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation
Altmetric Badge

Mentioned by

facebook
1 Facebook page

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation
Chapter number 13
Book title
Information Security and Privacy
Published in
Lecture notes in computer science, July 2014
DOI 10.1007/978-3-319-08344-5_13
Book ISBNs
978-3-31-908343-8, 978-3-31-908344-5
Authors

Mingwu Zhang

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 21 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 38%
Student > Master 4 19%
Researcher 2 10%
Professor 1 5%
Other 1 5%
Other 2 10%
Unknown 3 14%
Readers by discipline Count As %
Computer Science 17 81%
Physics and Astronomy 1 5%
Unknown 3 14%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 11 November 2014.
All research outputs
#20,242,779
of 22,770,070 outputs
Outputs from Lecture notes in computer science
#6,980
of 8,123 outputs
Outputs of similar age
#190,336
of 225,753 outputs
Outputs of similar age from Lecture notes in computer science
#132
of 166 outputs
Altmetric has tracked 22,770,070 research outputs across all sources so far. This one is in the 1st percentile – i.e., 1% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,123 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 1st percentile – i.e., 1% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 225,753 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 1st percentile – i.e., 1% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 166 others from the same source and published within six weeks on either side of this one. This one is in the 1st percentile – i.e., 1% of its contemporaries scored the same or lower than it.