↓ Skip to main content

Trusted Systems

Overview of attention for book
Cover of 'Trusted Systems'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Identity-Embedding Method for Decentralized Public-Key Infrastructure
  3. Altmetric Badge
    Chapter 2 Diversification of System Calls in Linux Binaries
  4. Altmetric Badge
    Chapter 3 Outsourced KP-ABE with Enhanced Security
  5. Altmetric Badge
    Chapter 4 A Simulated Annealing Algorithm for SVP Challenge Through y -Sparse Representations of Short Lattice Vectors
  6. Altmetric Badge
    Chapter 5 Rerandomizable Threshold Blind Signatures
  7. Altmetric Badge
    Chapter 6 Verifiable Computation of Large Polynomials
  8. Altmetric Badge
    Chapter 7 A Characterization of Cybersecurity Posture from Network Telescope Data
  9. Altmetric Badge
    Chapter 8 Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage
  10. Altmetric Badge
    Chapter 9 Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set
  11. Altmetric Badge
    Chapter 10 On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded Systems
  12. Altmetric Badge
    Chapter 11 How to Choose Interesting Points for Template Attacks More Effectively?
  13. Altmetric Badge
    Chapter 12 NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust
  14. Altmetric Badge
    Chapter 13 A Privacy-Aware Access Model on Anonymized Data
  15. Altmetric Badge
    Chapter 14 Functional Signatures from Indistinguishability Obfuscation
  16. Altmetric Badge
    Chapter 15 Lightweight Protocol for Trusted Spontaneous Communication
  17. Altmetric Badge
    Chapter 16 Using TPM Secure Storage in Trusted High Availability Systems
  18. Altmetric Badge
    Chapter 17 APP Vetting Based on the Consistency of Description and APK
  19. Altmetric Badge
    Chapter 18 Traitor Tracing Based on Partially-Ordered Hierarchical Encryption
  20. Altmetric Badge
    Chapter 19 SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs
  21. Altmetric Badge
    Chapter 20 Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists
  22. Altmetric Badge
    Chapter 21 DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes
  23. Altmetric Badge
    Chapter 22 Template Attacks Based on Priori Knowledge
  24. Altmetric Badge
    Chapter 23 Some Observations on the Lightweight Block Cipher Piccolo-80
  25. Altmetric Badge
    Chapter 24 A Memory Efficient Variant of an Implementation of the F $$_4$$ Algorithm for Computing Gröbner Bases
  26. Altmetric Badge
    Chapter 25 Efficient Public Key Encryption with Field-Free Conjunctive Keywords Search
  27. Altmetric Badge
    Chapter 26 mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group
  28. Altmetric Badge
    Chapter 27 Secure $$(M+1)$$ st-Price Auction with Automatic Tie-Break
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
2 patents

Readers on

mendeley
8 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Trusted Systems
Published by
Springer International Publishing, January 2016
DOI 10.1007/978-3-319-27998-5
ISBNs
978-3-31-927997-8, 978-3-31-927998-5
Editors

Yung, Moti, Zhu, Liehuang, Yang, Yanjiang

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 8 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 8 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 25%
Professor > Associate Professor 1 13%
Unknown 5 63%
Readers by discipline Count As %
Computer Science 3 38%
Unknown 5 63%