Applications and Techniques in Information Security
Springer Berlin Heidelberg
Chapter title |
Using Randomization to Attack Similarity Digests
|
---|---|
Chapter number | 19 |
Book title |
Applications and Techniques in Information Security
|
Published by |
Springer, Berlin, Heidelberg, November 2014
|
DOI | 10.1007/978-3-662-45670-5_19 |
Book ISBNs |
978-3-66-245669-9, 978-3-66-245670-5
|
Authors |
Jonathan Oliver, Scott Forman, Chun Cheng, Oliver, Jonathan, Forman, Scott, Cheng, Chun |
Country | Count | As % |
---|---|---|
Unknown | 21 | 100% |
Readers by professional status | Count | As % |
---|---|---|
Student > Ph. D. Student | 6 | 29% |
Student > Bachelor | 4 | 19% |
Student > Master | 3 | 14% |
Professor > Associate Professor | 2 | 10% |
Student > Doctoral Student | 1 | 5% |
Other | 0 | 0% |
Unknown | 5 | 24% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 12 | 57% |
Engineering | 3 | 14% |
Unknown | 6 | 29% |