↓ Skip to main content

Information Security Practice and Experience

Overview of attention for book
Cover of 'Information Security Practice and Experience'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes
  3. Altmetric Badge
    Chapter 2 A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
  4. Altmetric Badge
    Chapter 3 RSA-Based Certificateless Public Key Encryption
  5. Altmetric Badge
    Chapter 4 Strongly Unforgeable ID-Based Signatures without Random Oracles
  6. Altmetric Badge
    Chapter 5 On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings
  7. Altmetric Badge
    Chapter 6 An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems
  8. Altmetric Badge
    Chapter 7 Reconstructing a Packed DLL Binary for Static Analysis
  9. Altmetric Badge
    Chapter 8 Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework
  10. Altmetric Badge
    Chapter 9 Efficient Concurrent n poly (log n ) -Simulatable Argument of Knowledge
  11. Altmetric Badge
    Chapter 10 New Constructions for Reusable, Non-erasure and Universally Composable Commitments
  12. Altmetric Badge
    Chapter 11 Certificateless Hybrid Signcryption
  13. Altmetric Badge
    Chapter 12 On Non-representable Secret Sharing Matroids
  14. Altmetric Badge
    Chapter 13 A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization
  15. Altmetric Badge
    Chapter 14 Information Security Practice and Experience
  16. Altmetric Badge
    Chapter 15 Security Specification for Conversion Technologies of Heterogeneous DRM Systems
  17. Altmetric Badge
    Chapter 16 Analysing Protocol Implementations
  18. Altmetric Badge
    Chapter 17 Measuring Anonymity
  19. Altmetric Badge
    Chapter 18 A Hybrid E-Voting Scheme
  20. Altmetric Badge
    Chapter 19 A Framework for Authenticated Key Exchange in the Standard Model
  21. Altmetric Badge
    Chapter 20 Secret Handshake: Strong Anonymity Definition and Construction
  22. Altmetric Badge
    Chapter 21 An Extended Authentication and Key Agreement Protocol of UMTS
  23. Altmetric Badge
    Chapter 22 Hash-Based Key Management Schemes for MPEG4-FGS
  24. Altmetric Badge
    Chapter 23 Twister – A Framework for Secure and Fast Hash Functions
  25. Altmetric Badge
    Chapter 24 Preimage Attack on Hash Function RIPEMD
  26. Altmetric Badge
    Chapter 25 Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL
  27. Altmetric Badge
    Chapter 26 Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher
  28. Altmetric Badge
    Chapter 27 Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2
  29. Altmetric Badge
    Chapter 28 Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard
  30. Altmetric Badge
    Chapter 29 On the Correctness of an Approach against Side-Channel Attacks
  31. Altmetric Badge
    Chapter 30 Ranking Attack Graphs with Graph Neural Networks
  32. Altmetric Badge
    Chapter 31 Implementing IDS Management on Lock-Keeper
  33. Altmetric Badge
    Chapter 32 Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems
  34. Altmetric Badge
    Chapter 33 Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
  35. Altmetric Badge
    Chapter 34 Trusted Privacy Domains – Challenges for Trusted Computing in Privacy-Protecting Information Sharing
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (66th percentile)
  • Good Attention Score compared to outputs of the same age and source (76th percentile)

Mentioned by

twitter
1 X user
wikipedia
1 Wikipedia page

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Practice and Experience
Published by
ADS, April 2009
DOI 10.1007/978-3-642-00843-6
ISBNs
978-3-64-200842-9, 978-3-64-200843-6
Editors

Bao, Feng, Li, Hui, Wang, Guilin

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Postgraduate 2 50%
Other 1 25%
Student > Ph. D. Student 1 25%
Readers by discipline Count As %
Computer Science 4 100%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 4. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 16 April 2023.
All research outputs
#6,675,942
of 23,578,918 outputs
Outputs from ADS
#8,281
of 38,202 outputs
Outputs of similar age
#29,573
of 94,958 outputs
Outputs of similar age from ADS
#81
of 368 outputs
Altmetric has tracked 23,578,918 research outputs across all sources so far. This one has received more attention than most of these and is in the 70th percentile.
So far Altmetric has tracked 38,202 research outputs from this source. They receive a mean Attention Score of 4.6. This one has done well, scoring higher than 76% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 94,958 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 66% of its contemporaries.
We're also able to compare this research output to 368 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 76% of its contemporaries.