↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Security Analysis of a Multi-factor Authenticated Key Exchange Protocol
  3. Altmetric Badge
    Chapter 2 Breaking an Animated CAPTCHA Scheme
  4. Altmetric Badge
    Chapter 3 Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens
  5. Altmetric Badge
    Chapter 4 RIKE: Using Revocable Identities to Support Key Escrow in PKIs
  6. Altmetric Badge
    Chapter 5 TreVisor
  7. Altmetric Badge
    Chapter 6 Authenticated Encryption: How Reordering Can Impact Performance
  8. Altmetric Badge
    Chapter 7 Length-Doubling Ciphers and Tweakable Ciphers
  9. Altmetric Badge
    Chapter 8 Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
  10. Altmetric Badge
    Chapter 9 Security Enhancements by OR-Proof in Identity-Based Identification
  11. Altmetric Badge
    Chapter 10 Identity-Based Extractable Hash Proofs and Their Applications
  12. Altmetric Badge
    Chapter 11 On Structural Signatures for Tree Data Structures
  13. Altmetric Badge
    Chapter 12 Inner-Product Lossy Trapdoor Functions and Applications
  14. Altmetric Badge
    Chapter 13 On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
  15. Altmetric Badge
    Chapter 14 Secure Accumulators from Euclidean Rings without Trusted Setup
  16. Altmetric Badge
    Chapter 15 Linear Fault Analysis of Block Ciphers
  17. Altmetric Badge
    Chapter 16 Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
  18. Altmetric Badge
    Chapter 17 Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions
  19. Altmetric Badge
    Chapter 18 Zero-Value Point Attacks on Kummer-Based Cryptosystem
  20. Altmetric Badge
    Chapter 19 PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
  21. Altmetric Badge
    Chapter 20 Wide Collisions in Practice
  22. Altmetric Badge
    Chapter 21 A General Construction for 1-Round δ -RMT and (0, δ )-SMT
  23. Altmetric Badge
    Chapter 22 A Prefiltering Approach to Regular Expression Matching for Network Security Systems
  24. Altmetric Badge
    Chapter 23 iHTTP: efficient authentication of non-confidential HTTP traffic
  25. Altmetric Badge
    Chapter 24 ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
  26. Altmetric Badge
    Chapter 25 Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations
  27. Altmetric Badge
    Chapter 26 The Shy Mayor: Private Badges in GeoSocial Networks
  28. Altmetric Badge
    Chapter 27 Detecting Social Spam Campaigns on Twitter
  29. Altmetric Badge
    Chapter 28 A New Framework for Privacy of RFID Path Authentication
  30. Altmetric Badge
    Chapter 29 GHB # : A Provably Secure HB -Like Lightweight Authentication Protocol
  31. Altmetric Badge
    Chapter 30 Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
  32. Altmetric Badge
    Chapter 31 SPICE  – Simple Privacy-Preserving Identity-Management for Cloud Environment
  33. Altmetric Badge
    Chapter 32 A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring
  34. Altmetric Badge
    Chapter 33 Private Computation of Spatial and Temporal Power Consumption with Smart Meters
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

4 news outlets
4 X users


3 Dimensions

Readers on

2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Applied Cryptography and Network Security
Published by
Springer Berlin Heidelberg, June 2012
DOI 10.1007/978-3-642-31284-7
978-3-64-231283-0, 978-3-64-231284-7

Bao, Feng, Samarati, Pierangela, Zhou, Jianying

X Demographics

X Demographics

The data shown below were collected from the profiles of 4 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Postgraduate 1 50%
Unknown 1 50%
Readers by discipline Count As %
Engineering 1 50%
Unknown 1 50%