↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Model Checking of Security Protocols with Pre-configuration
  3. Altmetric Badge
    Chapter 2 Remote Access VPN with Port Protection Function by Mobile Codes
  4. Altmetric Badge
    Chapter 3 A Role of DEVS Simulation for Information Assurance
  5. Altmetric Badge
    Chapter 4 Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes
  6. Altmetric Badge
    Chapter 5 Reliable Cascaded Delegation Scheme for Mobile Agent Environments
  7. Altmetric Badge
    Chapter 6 Practical Solution for Location Privacy in Mobile IPv6
  8. Altmetric Badge
    Chapter 7 CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection
  9. Altmetric Badge
    Chapter 8 Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System
  10. Altmetric Badge
    Chapter 9 Towards a Global Security Architecture for Intrusion Detection and Reaction Management
  11. Altmetric Badge
    Chapter 10 Intrusion-Tolerant System Design for Web Server Survivability
  12. Altmetric Badge
    Chapter 11 PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access
  13. Altmetric Badge
    Chapter 12 An Automatic Security Evaluation System for IPv6 Network
  14. Altmetric Badge
    Chapter 13 A Location Privacy Protection Mechanism for Smart Space
  15. Altmetric Badge
    Chapter 14 Secure System Architecture Based on Dynamic Resource Reallocation
  16. Altmetric Badge
    Chapter 15 Fair Exchange with Guardian Angels
  17. Altmetric Badge
    Chapter 16 Sign-Based Differential Power Analysis
  18. Altmetric Badge
    Chapter 17 Asymmetric Watermarking Scheme Using Permutation Braids
  19. Altmetric Badge
    Chapter 18 Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF( p ) and GF(2 m )
  20. Altmetric Badge
    Chapter 19 Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction
  21. Altmetric Badge
    Chapter 20 Multi-dimensional Hash Chain For Sealed-Bid Auction
  22. Altmetric Badge
    Chapter 21 An Improved Forward Integrity Protocol for Mobile Agents
  23. Altmetric Badge
    Chapter 22 Taming “Trusted Platforms” by Operating System Design
  24. Altmetric Badge
    Chapter 23 A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation
  25. Altmetric Badge
    Chapter 24 Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes
  26. Altmetric Badge
    Chapter 25 3D Face Recognition under Pose Varying Environments
  27. Altmetric Badge
    Chapter 26 An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint
  28. Altmetric Badge
    Chapter 27 Fingerprint-Based Authentication for USB Token Systems
  29. Altmetric Badge
    Chapter 28 Iris Recognition System Using Wavelet Packet and Support Vector Machines
  30. Altmetric Badge
    Chapter 29 Biometrics Identification and Verification Using Projection-Based Face Recognition System
  31. Altmetric Badge
    Chapter 30 Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification
  32. Altmetric Badge
    Chapter 31 E-MHT. An Efficient Protocol for Certificate Status Checking
  33. Altmetric Badge
    Chapter 32 A Comment on Group Independent Threshold Sharing
  34. Altmetric Badge
    Chapter 33 Automation-Considered Logic of Authentication and Key Distribution
  35. Altmetric Badge
    Chapter 34 The MESH Block Ciphers
  36. Altmetric Badge
    Chapter 35 Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves
  37. Altmetric Badge
    Chapter 36 Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
166 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Applications
Published by
Springer Berlin Heidelberg, December 2003
DOI 10.1007/b95188
ISBNs
978-3-54-020827-3, 978-3-54-024591-9
Editors

Chae, Ki-Joon, Yung, Moti

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 166 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Portugal 2 1%
Hong Kong 2 1%
Cyprus 1 <1%
Brazil 1 <1%
South Africa 1 <1%
Thailand 1 <1%
United States 1 <1%
Unknown 157 95%

Demographic breakdown

Readers by professional status Count As %
Student > Master 52 31%
Student > Ph. D. Student 29 17%
Student > Bachelor 14 8%
Researcher 11 7%
Student > Doctoral Student 10 6%
Other 22 13%
Unknown 28 17%
Readers by discipline Count As %
Computer Science 97 58%
Engineering 20 12%
Business, Management and Accounting 7 4%
Social Sciences 5 3%
Mathematics 3 2%
Other 2 1%
Unknown 32 19%