↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313
  3. Altmetric Badge
    Chapter 2 Generalized Security Analysis of the Random Key Bits Leakage Attack
  4. Altmetric Badge
    Chapter 3 Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher
  5. Altmetric Badge
    Chapter 4 Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward
  6. Altmetric Badge
    Chapter 5 Known-Key Distinguisher on Round-Reduced 3D Block Cipher
  7. Altmetric Badge
    Chapter 6 Identity-Based Signcryption from Identity-Based Cryptography
  8. Altmetric Badge
    Chapter 7 Order-Preserving Encryption for Non-uniformly Distributed Plaintexts
  9. Altmetric Badge
    Chapter 8 Solving a DLP with Auxiliary Input with the ρ -Algorithm
  10. Altmetric Badge
    Chapter 9 A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems
  11. Altmetric Badge
    Chapter 10 A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage
  12. Altmetric Badge
    Chapter 11 Rule Indexing for Efficient Intrusion Detection Systems
  13. Altmetric Badge
    Chapter 12 Security Data Extraction from IEC 61850 ACSI Models for Network and System Management
  14. Altmetric Badge
    Chapter 13 Lightweight Middleware-Based ZigBee Security in Building Energy Management System
  15. Altmetric Badge
    Chapter 14 A Map-Layer-Based Access Control Model
  16. Altmetric Badge
    Chapter 15 Application Authentication for Hybrid Services of Broadcasting and Communications Networks
  17. Altmetric Badge
    Chapter 16 Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols
  18. Altmetric Badge
    Chapter 17 Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks
  19. Altmetric Badge
    Chapter 18 Mutual Private Set Intersection with Linear Complexity
  20. Altmetric Badge
    Chapter 19 Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs
  21. Altmetric Badge
    Chapter 20 Evaluating the Security and Privacy of Near Field Communication – Case: Public Transportation
  22. Altmetric Badge
    Chapter 21 Exploiting Routing Tree Construction in CTP
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
patent
1 patent

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Applications
Published by
Springer Berlin Heidelberg, February 2012
DOI 10.1007/978-3-642-27890-7
ISBNs
978-3-64-227889-1, 978-3-64-227890-7
Editors

Jung, Souhwan, Yung, Moti

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Postgraduate 4 100%
Readers by discipline Count As %
Computer Science 4 100%