↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Forward Secure Ring Signature without Random Oracles
  3. Altmetric Badge
    Chapter 2 Ring Signature Schemes from Lattice Basis Delegation
  4. Altmetric Badge
    Chapter 3 Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
  5. Altmetric Badge
    Chapter 4 A Variant of Boyen-Waters Anonymous IBE Scheme
  6. Altmetric Badge
    Chapter 5 Non-interactive Opening for Ciphertexts Encrypted by Shared Keys
  7. Altmetric Badge
    Chapter 6 Lightweight RFID Mutual Authentication Protocol against Feasible Problems
  8. Altmetric Badge
    Chapter 7 A Note on a Privacy-Preserving Distance-Bounding Protocol
  9. Altmetric Badge
    Chapter 8 Delegable Provable Data Possession for Remote Data in the Clouds
  10. Altmetric Badge
    Chapter 9 Unconditionally Secure Oblivious Transfer Based on Channel Delays
  11. Altmetric Badge
    Chapter 10 Preserving Security and Privacy in Large-Scale VANETs
  12. Altmetric Badge
    Chapter 11 A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure
  13. Altmetric Badge
    Chapter 12 Ideal Secret Sharing Schemes with Share Selectability
  14. Altmetric Badge
    Chapter 13 A Novel Pyramidal Dual-Tree Directional Filter Bank Domain Color Image Watermarking Algorithm
  15. Altmetric Badge
    Chapter 14 Detection for Multiplicative Watermarking in DCT Domain by Cauchy Model
  16. Altmetric Badge
    Chapter 15 Extension of Barreto-Voloch Root Extraction Method
  17. Altmetric Badge
    Chapter 16 Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean Functions
  18. Altmetric Badge
    Chapter 17 Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGA
  19. Altmetric Badge
    Chapter 18 First Differential Attack on Full 32-Round GOST
  20. Altmetric Badge
    Chapter 19 Collision Attack for the Hash Function Extended MD4
  21. Altmetric Badge
    Chapter 20 Linear Cryptanalysis of ARIA Block Cipher
  22. Altmetric Badge
    Chapter 21 Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha
  23. Altmetric Badge
    Chapter 22 Behavior Analysis-Based Dynamic Trust Measurement Model
  24. Altmetric Badge
    Chapter 23 Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications
  25. Altmetric Badge
    Chapter 24 Analyzing the Performance of Dither Modulation in Presence of Composite Attacks
  26. Altmetric Badge
    Chapter 25 Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks
  27. Altmetric Badge
    Chapter 26 A Unified Security Framework for Multi-domain Wireless Mesh Networks
  28. Altmetric Badge
    Chapter 27 Ontology Model-Based Static Analysis of Security Vulnerabilities
  29. Altmetric Badge
    Chapter 28 A Multi-compositional Enforcement on Information Flow Security
  30. Altmetric Badge
    Chapter 29 HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
  31. Altmetric Badge
    Chapter 30 An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching Scores
  32. Altmetric Badge
    Chapter 31 Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization
  33. Altmetric Badge
    Chapter 32 Situational Assessment of Intrusion Alerts: A Multi Attack Scenario Evaluation
  34. Altmetric Badge
    Chapter 33 Minimising Anonymity Loss in Anonymity Networks under DoS Attacks
Attention for Chapter 9: Unconditionally Secure Oblivious Transfer Based on Channel Delays
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Unconditionally Secure Oblivious Transfer Based on Channel Delays
Chapter number 9
Book title
Information and Communications Security
Published by
Springer, Berlin, Heidelberg, November 2011
DOI 10.1007/978-3-642-25243-3_9
Book ISBNs
978-3-64-225242-6, 978-3-64-225243-3
Authors

Kai-Yuen Cheong, Atsuko Miyaji

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 21 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 6 29%
Student > Ph. D. Student 6 29%
Researcher 3 14%
Lecturer 1 5%
Other 1 5%
Other 2 10%
Unknown 2 10%
Readers by discipline Count As %
Computer Science 16 76%
Mathematics 1 5%
Business, Management and Accounting 1 5%
Physics and Astronomy 1 5%
Unknown 2 10%