↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 M-ORAM: A Matrix ORAM with Log N Bandwidth Cost
  3. Altmetric Badge
    Chapter 2 Process Variation Evaluation Using RO PUF for Enhancing SCA-Resistant Dual-Rail Implementation
  4. Altmetric Badge
    Chapter 3 Compact Implementations of LEA Block Cipher for Low-End Microprocessors
  5. Altmetric Badge
    Chapter 4 Compact Implementations of LSH
  6. Altmetric Badge
    Chapter 5 Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device
  7. Altmetric Badge
    Chapter 6 Security Analysis on RFID Mutual Authentication Protocol
  8. Altmetric Badge
    Chapter 7 How Much Randomness Can Be Extracted from Memoryless Shannon Entropy Sources?
  9. Altmetric Badge
    Chapter 8 Two Types of Special Bases for Integral Lattices
  10. Altmetric Badge
    Chapter 9 Keyword Updatable PEKS
  11. Altmetric Badge
    Chapter 10 On Partitioning Secret Data Based on Concept of Functional Safety
  12. Altmetric Badge
    Chapter 11 Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation
  13. Altmetric Badge
    Chapter 12 Publishing Graph Data with Subgraph Differential Privacy
  14. Altmetric Badge
    Chapter 13 An Improved Analysis of Broadcast Attacks on the GGH Cryptosystem
  15. Altmetric Badge
    Chapter 14 Secure Binary Field Multiplication
  16. Altmetric Badge
    Chapter 15 An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter
  17. Altmetric Badge
    Chapter 16 Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack
  18. Altmetric Badge
    Chapter 17 An Improved Masking Scheme for S-Box Software Implementations
  19. Altmetric Badge
    Chapter 18 Open Sesame! Hacking the Password
  20. Altmetric Badge
    Chapter 19 BurnFit: Analyzing and Exploiting Wearable Devices
  21. Altmetric Badge
    Chapter 20 Security Analysis of FHSS-type Drone Controller
  22. Altmetric Badge
    Chapter 21 Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic Analysis
  23. Altmetric Badge
    Chapter 22 Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments
  24. Altmetric Badge
    Chapter 23 A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server
  25. Altmetric Badge
    Chapter 24 Cyber Security Considerations for Designing IoT-Based Control Systems
  26. Altmetric Badge
    Chapter 25 Frying PAN: Dissecting Customized Protocol for Personal Area Network
  27. Altmetric Badge
    Chapter 26 Structured Design Approach for an Optimal Programmable Synchronous Security Processor
  28. Altmetric Badge
    Chapter 27 On Zero Knowledge Argument with PQT Soundness
  29. Altmetric Badge
    Chapter 28 Performance Analysis of Multiple Classifier System in DoS Attack Detection
  30. Altmetric Badge
    Chapter 29 Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan
  31. Altmetric Badge
    Chapter 30 Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization
  32. Altmetric Badge
    Chapter 31 Cost-Effective Modeling for Authentication and Its Application to Activity Tracker
  33. Altmetric Badge
    Chapter 32 Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree
  34. Altmetric Badge
    Chapter 33 Automatic Security Classification with Lasso
  35. Altmetric Badge
    Chapter 34 Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM
  36. Altmetric Badge
    Chapter 35 How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent

Citations

dimensions_citation
8 Dimensions

Readers on

mendeley
33 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Applications
Published by
Springer International Publishing, March 2016
DOI 10.1007/978-3-319-31875-2
ISBNs
978-3-31-931874-5, 978-3-31-931875-2
Editors

Kim, Ho-won, Choi, Dooho

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 33 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 33 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 4 12%
Professor 1 3%
Student > Bachelor 1 3%
Student > Ph. D. Student 1 3%
Unknown 26 79%
Readers by discipline Count As %
Engineering 4 12%
Computer Science 3 9%
Unknown 26 79%