↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 New Modular Compilers for Authenticated Key Exchange
  3. Altmetric Badge
    Chapter 2 Password-Based Authenticated Key Exchange without Centralized Trusted Setup
  4. Altmetric Badge
    Chapter 3 A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols
  5. Altmetric Badge
    Chapter 4 Improved Constructions of PRFs Secure Against Related-Key Attacks
  6. Altmetric Badge
    Chapter 5 Verifiable Multi-server Private Information Retrieval
  7. Altmetric Badge
    Chapter 6 Certified Bitcoins
  8. Altmetric Badge
    Chapter 7 Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited
  9. Altmetric Badge
    Chapter 8 Private Message Transmission Using Disjoint Paths
  10. Altmetric Badge
    Chapter 9 Partial Key Exposure Attacks on Takagi’s Variant of RSA
  11. Altmetric Badge
    Chapter 10 New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
  12. Altmetric Badge
    Chapter 11 Bit-Flip Faults on Elliptic Curve Base Fields, Revisited
  13. Altmetric Badge
    Chapter 12 All-but-One Dual Projective Hashing and Its Applications
  14. Altmetric Badge
    Chapter 13 Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange
  15. Altmetric Badge
    Chapter 14 Sakura: A Flexible Coding for Tree Hashing
  16. Altmetric Badge
    Chapter 15 Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions
  17. Altmetric Badge
    Chapter 16 Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications
  18. Altmetric Badge
    Chapter 17 On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers
  19. Altmetric Badge
    Chapter 18 Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function
  20. Altmetric Badge
    Chapter 19 Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro
  21. Altmetric Badge
    Chapter 20 Detecting Hidden Leakages
  22. Altmetric Badge
    Chapter 21 Improving Intrusion Detection Systems for Wireless Sensor Networks
  23. Altmetric Badge
    Chapter 22 MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
  24. Altmetric Badge
    Chapter 23 BackRef: Accountability in Anonymous Communication Networks
  25. Altmetric Badge
    Chapter 24 WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP
  26. Altmetric Badge
    Chapter 25 A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List
  27. Altmetric Badge
    Chapter 26 Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials
  28. Altmetric Badge
    Chapter 27 On Updatable Redactable Signatures
  29. Altmetric Badge
    Chapter 28 Practical Signatures from the Partial Fourier Recovery Problem
  30. Altmetric Badge
    Chapter 29 Activity Spoofing and Its Defense in Android Smartphones
  31. Altmetric Badge
    Chapter 30 Polymorphism as a Defense for Automated Attack of Websites
  32. Altmetric Badge
    Chapter 31 Fragmentation Considered Leaking: Port Inference for DNS Poisoning
  33. Altmetric Badge
    Chapter 32 Delegating a Pairing Can Be Both Secure and Efficient
  34. Altmetric Badge
    Chapter 33 Automatic Protocol Selection in Secure Two-Party Computations
Attention for Chapter 31: Fragmentation Considered Leaking: Port Inference for DNS Poisoning
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (75th percentile)
  • High Attention Score compared to outputs of the same age and source (82nd percentile)

Mentioned by

twitter
2 X users
patent
1 patent

Readers on

mendeley
33 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Fragmentation Considered Leaking: Port Inference for DNS Poisoning
Chapter number 31
Book title
Applied Cryptography and Network Security
Published in
Lecture notes in computer science, June 2014
DOI 10.1007/978-3-319-07536-5_31
Book ISBNs
978-3-31-907535-8, 978-3-31-907536-5
Authors

Haya Shulman, Michael Waidner, Shulman, Haya, Waidner, Michael

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 33 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
China 1 3%
Unknown 32 97%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 9 27%
Student > Master 7 21%
Lecturer 2 6%
Student > Doctoral Student 2 6%
Other 2 6%
Other 6 18%
Unknown 5 15%
Readers by discipline Count As %
Computer Science 24 73%
Mathematics 1 3%
Unspecified 1 3%
Physics and Astronomy 1 3%
Chemistry 1 3%
Other 0 0%
Unknown 5 15%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 5. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 11 July 2023.
All research outputs
#6,369,318
of 24,220,739 outputs
Outputs from Lecture notes in computer science
#1,945
of 8,180 outputs
Outputs of similar age
#56,848
of 233,624 outputs
Outputs of similar age from Lecture notes in computer science
#29
of 161 outputs
Altmetric has tracked 24,220,739 research outputs across all sources so far. This one has received more attention than most of these and is in the 73rd percentile.
So far Altmetric has tracked 8,180 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has done well, scoring higher than 75% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 233,624 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 75% of its contemporaries.
We're also able to compare this research output to 161 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 82% of its contemporaries.