↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313
  3. Altmetric Badge
    Chapter 2 Generalized Security Analysis of the Random Key Bits Leakage Attack
  4. Altmetric Badge
    Chapter 3 Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher
  5. Altmetric Badge
    Chapter 4 Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward
  6. Altmetric Badge
    Chapter 5 Known-Key Distinguisher on Round-Reduced 3D Block Cipher
  7. Altmetric Badge
    Chapter 6 Identity-Based Signcryption from Identity-Based Cryptography
  8. Altmetric Badge
    Chapter 7 Order-Preserving Encryption for Non-uniformly Distributed Plaintexts
  9. Altmetric Badge
    Chapter 8 Solving a DLP with Auxiliary Input with the ρ -Algorithm
  10. Altmetric Badge
    Chapter 9 A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems
  11. Altmetric Badge
    Chapter 10 A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage
  12. Altmetric Badge
    Chapter 11 Rule Indexing for Efficient Intrusion Detection Systems
  13. Altmetric Badge
    Chapter 12 Security Data Extraction from IEC 61850 ACSI Models for Network and System Management
  14. Altmetric Badge
    Chapter 13 Lightweight Middleware-Based ZigBee Security in Building Energy Management System
  15. Altmetric Badge
    Chapter 14 A Map-Layer-Based Access Control Model
  16. Altmetric Badge
    Chapter 15 Application Authentication for Hybrid Services of Broadcasting and Communications Networks
  17. Altmetric Badge
    Chapter 16 Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols
  18. Altmetric Badge
    Chapter 17 Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks
  19. Altmetric Badge
    Chapter 18 Mutual Private Set Intersection with Linear Complexity
  20. Altmetric Badge
    Chapter 19 Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs
  21. Altmetric Badge
    Chapter 20 Evaluating the Security and Privacy of Near Field Communication – Case: Public Transportation
  22. Altmetric Badge
    Chapter 21 Exploiting Routing Tree Construction in CTP
Attention for Chapter 18: Mutual Private Set Intersection with Linear Complexity
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
29 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Mutual Private Set Intersection with Linear Complexity
Chapter number 18
Book title
Information Security Applications
Published by
Springer, Berlin, Heidelberg, August 2011
DOI 10.1007/978-3-642-27890-7_18
Book ISBNs
978-3-64-227889-1, 978-3-64-227890-7
Authors

Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon, Kim, Myungsun, Lee, Hyung Tae, Cheon, Jung Hee

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 29 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Korea, Republic of 1 3%
Unknown 28 97%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 10 34%
Student > Master 8 28%
Researcher 3 10%
Professor > Associate Professor 2 7%
Professor 1 3%
Other 2 7%
Unknown 3 10%
Readers by discipline Count As %
Computer Science 22 76%
Engineering 2 7%
Physics and Astronomy 1 3%
Mathematics 1 3%
Unknown 3 10%