↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Adaptive Detection of Local Scanners
  3. Altmetric Badge
    Chapter 2 Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection
  4. Altmetric Badge
    Chapter 3 DSO: Dependable Signing Overlay
  5. Altmetric Badge
    Chapter 4 Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
  6. Altmetric Badge
    Chapter 5 A Handy Multi-coupon System
  7. Altmetric Badge
    Chapter 6 An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families
  8. Altmetric Badge
    Chapter 7 Efficient Memory Bound Puzzles Using Pattern Databases
  9. Altmetric Badge
    Chapter 8 Effect of Malicious Synchronization
  10. Altmetric Badge
    Chapter 9 Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
  11. Altmetric Badge
    Chapter 10 Password Based Server Aided Key Exchange 
  12. Altmetric Badge
    Chapter 11 Applied Cryptography and Network Security
  13. Altmetric Badge
    Chapter 12 Stateful Subset Cover
  14. Altmetric Badge
    Chapter 13 The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions
  15. Altmetric Badge
    Chapter 14 Breaking a New Instance of TTM Cryptosystems
  16. Altmetric Badge
    Chapter 15 Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
  17. Altmetric Badge
    Chapter 16 An AES Smart Card Implementation Resistant to Power Analysis Attacks
  18. Altmetric Badge
    Chapter 17 Physical Security Bounds Against Tampering
  19. Altmetric Badge
    Chapter 18 Flexible Exponentiation with Resistance to Side Channel Attacks
  20. Altmetric Badge
    Chapter 19 An Improved Poly1305 MAC
  21. Altmetric Badge
    Chapter 20 Certificateless Public-Key Signature: Security Model and Efficient Construction
  22. Altmetric Badge
    Chapter 21 High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
  23. Altmetric Badge
    Chapter 22 Authentication for Paranoids: Multi-party Secret Handshakes
  24. Altmetric Badge
    Chapter 23 On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan
  25. Altmetric Badge
    Chapter 24 W3Bcrypt: Encryption as a Stylesheet
  26. Altmetric Badge
    Chapter 25 Combinatorial Structures for Design of Wireless Sensor Networks
  27. Altmetric Badge
    Chapter 26 Public Key Cryptography Sans Certificates in Ad Hoc Networks
  28. Altmetric Badge
    Chapter 27 Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks
  29. Altmetric Badge
    Chapter 28 A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography
  30. Altmetric Badge
    Chapter 29 Results on Almost Resilient Functions
  31. Altmetric Badge
    Chapter 30 Real Perfect Contrast Visual Secret Sharing Schemes with Reversing
  32. Altmetric Badge
    Chapter 31 On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
  33. Altmetric Badge
    Chapter 32 Improving the Randomized Initial Point Countermeasure Against DPA
  34. Altmetric Badge
    Chapter 33 Syntax-Driven Private Evaluation of Quantified Membership Queries
Attention for Chapter 17: Physical Security Bounds Against Tampering
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
26 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Physical Security Bounds Against Tampering
Chapter number 17
Book title
Applied Cryptography and Network Security
Published by
Springer, Berlin, Heidelberg, June 2006
DOI 10.1007/11767480_17
Book ISBNs
978-3-54-034703-3, 978-3-54-034704-0
Authors

Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi, Lemke, Kerstin, Paar, Christof, Sadeghi, Ahmad-Reza

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 26 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 26 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 38%
Student > Master 5 19%
Researcher 2 8%
Professor 2 8%
Other 1 4%
Other 3 12%
Unknown 3 12%
Readers by discipline Count As %
Computer Science 20 77%
Engineering 2 8%
Physics and Astronomy 1 4%
Unknown 3 12%