↓ Skip to main content

Information Security and Cryptology

Overview of attention for book
Cover of 'Information Security and Cryptology'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Cryptanalysis of the SFLASH Signature Scheme
  3. Altmetric Badge
    Chapter 2 On the Evolution of User Authentication: Non-bilateral Factors
  4. Altmetric Badge
    Chapter 3 ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
  5. Altmetric Badge
    Chapter 4 Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility
  6. Altmetric Badge
    Chapter 5 An Efficient ID-Based Proxy Signature Scheme from Pairings
  7. Altmetric Badge
    Chapter 6 Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
  8. Altmetric Badge
    Chapter 7 Linear Slide Attacks on the KeeLoq Block Cipher
  9. Altmetric Badge
    Chapter 8 A Key Predistribution Scheme Based on 3-Designs
  10. Altmetric Badge
    Chapter 9 Provably Secure N -Party Authenticated Key Exchange in the Multicast DPWA Setting
  11. Altmetric Badge
    Chapter 10 A Provably Secure One-Pass Two-Party Key Establishment Protocol
  12. Altmetric Badge
    Chapter 11 Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption
  13. Altmetric Badge
    Chapter 12 Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries
  14. Altmetric Badge
    Chapter 13 A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor
  15. Altmetric Badge
    Chapter 14 Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
  16. Altmetric Badge
    Chapter 15 Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks
  17. Altmetric Badge
    Chapter 16 Probabilistic ( n , n ) Visual Secret Sharing Scheme for Grayscale Images
  18. Altmetric Badge
    Chapter 17 Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
  19. Altmetric Badge
    Chapter 18 Four Families of Binary Sequences with Low Correlation and Large Linear Complexity
  20. Altmetric Badge
    Chapter 19 Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves
  21. Altmetric Badge
    Chapter 20 Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators
  22. Altmetric Badge
    Chapter 21 Linear Equation on Polynomial Single Cycle T-Functions
  23. Altmetric Badge
    Chapter 22 Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables
  24. Altmetric Badge
    Chapter 23 Anonymity and k -Choice Identities
  25. Altmetric Badge
    Chapter 24 Deniable Authentication on the Internet
  26. Altmetric Badge
    Chapter 25 Orthogonality between Key Privacy and Data Privacy, Revisited
  27. Altmetric Badge
    Chapter 26 Unlinkable Randomizable Signature and Its Application in Group Signature
  28. Altmetric Badge
    Chapter 27 An Improved Collision Attack on MD5 Algorithm
  29. Altmetric Badge
    Chapter 28 Multivariates Polynomials for Hashing
  30. Altmetric Badge
    Chapter 29 Efficient Public Key Encryption with Keyword Search Schemes from Pairings
  31. Altmetric Badge
    Chapter 30 Multi-Identity Single-Key Decryption without Random Oracles
  32. Altmetric Badge
    Chapter 31 Kipnis-Shamir Attack on HFE Revisited
  33. Altmetric Badge
    Chapter 32 Cryptanalysis of General Lu-Lee Type Systems
  34. Altmetric Badge
    Chapter 33 A Timing-Resistant Elliptic Curve Backdoor in RSA
  35. Altmetric Badge
    Chapter 34 A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol
  36. Altmetric Badge
    Chapter 35 Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control
  37. Altmetric Badge
    Chapter 36 Building Trusted Sub-domain for the Grid with Trusted Computing
  38. Altmetric Badge
    Chapter 37 Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
  39. Altmetric Badge
    Chapter 38 Online Tracing Scanning Worm with Sliding Window
  40. Altmetric Badge
    Chapter 39 A New Proactive Defense Model Based on Intrusion Deception and Traceback
  41. Altmetric Badge
    Chapter 40 On Modeling Post Decryption Error Processes in UMTS Air Interface
  42. Altmetric Badge
    Chapter 41 A Simple, Smart and Extensible Framework for Network Security Measurement
Attention for Chapter 8: A Key Predistribution Scheme Based on 3-Designs
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A Key Predistribution Scheme Based on 3-Designs
Chapter number 8
Book title
Information Security and Cryptology
Published by
Springer, Berlin, Heidelberg, August 2007
DOI 10.1007/978-3-540-79499-8_8
Book ISBNs
978-3-54-079498-1, 978-3-54-079499-8
Authors

Junwu Dong, Dingyi Pei, Xueli Wang, Dong, Junwu, Pei, Dingyi, Wang, Xueli

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 50%
Other 1 50%
Readers by discipline Count As %
Computer Science 2 100%