↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Attestation: Evidence and Trust
  3. Altmetric Badge
    Chapter 2 A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail
  4. Altmetric Badge
    Chapter 3 Unclonable Lightweight Authentication Scheme
  5. Altmetric Badge
    Chapter 4 Threat Modelling in User Performed Authentication
  6. Altmetric Badge
    Chapter 5 Access with Fast Batch Verifiable Anonymous Credentials
  7. Altmetric Badge
    Chapter 6 Quantifying Timing Leaks and Cost Optimisation
  8. Altmetric Badge
    Chapter 7 Method for Detecting Vulnerability to Doubling Attacks
  9. Altmetric Badge
    Chapter 8 Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements
  10. Altmetric Badge
    Chapter 9 Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box
  11. Altmetric Badge
    Chapter 10 Analysis of Two Attacks on Reduced-Round Versions of the SMS4
  12. Altmetric Badge
    Chapter 11 Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack
  13. Altmetric Badge
    Chapter 12 Beyond User-to-User Access Control for Online Social Networks
  14. Altmetric Badge
    Chapter 13 Revocation Schemes for Delegation Licences
  15. Altmetric Badge
    Chapter 14 Reusability of Functionality-Based Application Confinement Policy Abstractions
  16. Altmetric Badge
    Chapter 15 Towards Role Based Trust Management without Distributed Searching of Credentials
  17. Altmetric Badge
    Chapter 16 BinHunt: Automatically Finding Semantic Differences in Binary Programs
  18. Altmetric Badge
    Chapter 17 Enhancing Java ME Security Support with Resource Usage Monitoring
  19. Altmetric Badge
    Chapter 18 Pseudo-randomness Inside Web Browsers
  20. Altmetric Badge
    Chapter 19 Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data
  21. Altmetric Badge
    Chapter 20 Embedding Renewable Cryptographic Keys into Continuous Noisy Data
  22. Altmetric Badge
    Chapter 21 Automated Device Pairing for Asymmetric Pairing Scenarios
  23. Altmetric Badge
    Chapter 22 Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.
  24. Altmetric Badge
    Chapter 23 Towards an Information Theoretic Analysis of Searchable Encryption
  25. Altmetric Badge
    Chapter 24 A Bootstrap Attack on Digital Watermarks in the Frequency Domain
  26. Altmetric Badge
    Chapter 25 Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes
  27. Altmetric Badge
    Chapter 26 Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval
  28. Altmetric Badge
    Chapter 27 Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study
  29. Altmetric Badge
    Chapter 28 Publicly Verifiable Remote Data Integrity
Attention for Chapter 15: Towards Role Based Trust Management without Distributed Searching of Credentials
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Towards Role Based Trust Management without Distributed Searching of Credentials
Chapter number 15
Book title
Information and Communications Security
Published by
Springer, Berlin, Heidelberg, October 2008
DOI 10.1007/978-3-540-88625-9_15
Book ISBNs
978-3-54-088624-2, 978-3-54-088625-9
Authors

Gang Yin, Huaimin Wang, Jianquan Ouyang, Ning Zhou, Dianxi Shi, Yin, Gang, Wang, Huaimin, Ouyang, Jianquan, Zhou, Ning, Shi, Dianxi

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
India 1 5%
Unknown 20 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 38%
Student > Master 4 19%
Researcher 3 14%
Professor 1 5%
Other 1 5%
Other 2 10%
Unknown 2 10%
Readers by discipline Count As %
Computer Science 18 86%
Physics and Astronomy 1 5%
Unknown 2 10%