↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Audio Steganalysis Based on Lossless Data-Compression Techniques
  3. Altmetric Badge
    Chapter 2 Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme
  4. Altmetric Badge
    Chapter 3 Impact of the Revocation Service in PKI Prices
  5. Altmetric Badge
    Chapter 4 Cryptanalysis of Multi-Prime RSA with Small Prime Difference
  6. Altmetric Badge
    Chapter 5 Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem
  7. Altmetric Badge
    Chapter 6 Improved Related-Key Differential Attacks on Reduced-Round LBlock
  8. Altmetric Badge
    Chapter 7 Countermeasures on Application Level Low-Rate Denial-of-Service Attack
  9. Altmetric Badge
    Chapter 8 Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test
  10. Altmetric Badge
    Chapter 9 Group Behavior Metrics for P2P Botnet Detection
  11. Altmetric Badge
    Chapter 10 Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA
  12. Altmetric Badge
    Chapter 11 Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model
  13. Altmetric Badge
    Chapter 12 Conversion of Real-Numbered Privacy-Preserving Problems into the Integer Domain
  14. Altmetric Badge
    Chapter 13 Perfect Ambiguous Optimistic Fair Exchange
  15. Altmetric Badge
    Chapter 14 Privacy-Preserving Noisy Keyword Search in Cloud Computing
  16. Altmetric Badge
    Chapter 15 Forward Secure Attribute-Based Signatures
  17. Altmetric Badge
    Chapter 16 On Constant-Round Precise Zero-Knowledge
  18. Altmetric Badge
    Chapter 17 Outsourcing Encryption of Attribute-Based Encryption with MapReduce
  19. Altmetric Badge
    Chapter 18 Security Enhancement of Identity-Based Identification with Reversibility
  20. Altmetric Badge
    Chapter 19 Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture
  21. Altmetric Badge
    Chapter 20 Permission-Based Abnormal Application Detection for Android
  22. Altmetric Badge
    Chapter 21 Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data
  23. Altmetric Badge
    Chapter 22 Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis
  24. Altmetric Badge
    Chapter 23 Taint Analysis of Security Code in the KLEE Symbolic Execution Engine
  25. Altmetric Badge
    Chapter 24 A Generic Approach for Providing Revocation Support in Secret Handshake
  26. Altmetric Badge
    Chapter 25 An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy
  27. Altmetric Badge
    Chapter 26 Exploring Mobile Proxies for Better Password Authentication
  28. Altmetric Badge
    Chapter 27 On Security of Universal Hash Function Based Multiple Authentication
  29. Altmetric Badge
    Chapter 28 A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack
  30. Altmetric Badge
    Chapter 29 Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack
  31. Altmetric Badge
    Chapter 30 Comparison between Side-Channel Analysis Distinguishers
  32. Altmetric Badge
    Chapter 31 Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
  33. Altmetric Badge
    Chapter 32 Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password Scheme
  34. Altmetric Badge
    Chapter 33 Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value Decomposition
  35. Altmetric Badge
    Chapter 34 Cookie-Proxy: A Scheme to Prevent SSLStrip Attack
  36. Altmetric Badge
    Chapter 35 Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet Explorer
  37. Altmetric Badge
    Chapter 36 Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding
  38. Altmetric Badge
    Chapter 37 Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance
  39. Altmetric Badge
    Chapter 38 A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains
  40. Altmetric Badge
    Chapter 39 Efficient Attribute Proofs in Anonymous Credential Using Attribute-based Cryptography
  41. Altmetric Badge
    Chapter 40 F 5 P 5 : Keyword Search over Encrypted Data with Five Functions and Five Privacy Assurances
  42. Altmetric Badge
    Chapter 41 Location Privacy Policy Management System
  43. Altmetric Badge
    Chapter 42 Privacy Protection in Social Networks Using l -Diversity
  44. Altmetric Badge
    Chapter 43 Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner
  45. Altmetric Badge
    Chapter 44 A Key Sharing Fuzzy Vault Scheme
  46. Altmetric Badge
    Chapter 45 A New Version of McEliece PKC Based on Convolutional Codes
  47. Altmetric Badge
    Chapter 46 Flexible Attribute-Based Encryption
  48. Altmetric Badge
    Chapter 47 Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles
  49. Altmetric Badge
    Chapter 48 A Comparative Study of Malware Family Classification
  50. Altmetric Badge
    Chapter 49 A Fine-Grained Classification Approach for the Packed Malicious Code
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information and Communications Security
Published by
Springer Berlin Heidelberg, October 2012
DOI 10.1007/978-3-642-34129-8
ISBNs
978-3-64-234128-1, 978-3-64-234129-8
Editors

Chim, Tat Wing, Yuen, Tsz Hon

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 2 50%
Student > Doctoral Student 1 25%
Student > Ph. D. Student 1 25%
Readers by discipline Count As %
Computer Science 3 75%
Engineering 1 25%