↓ Skip to main content

Applications and Techniques in Information Security

Overview of attention for book
Cover of 'Applications and Techniques in Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map
  3. Altmetric Badge
    Chapter 2 An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
  4. Altmetric Badge
    Chapter 3 Cryptographic Public Key Length Prediction
  5. Altmetric Badge
    Chapter 4 An Image Encryption Algorithm Based on Chua’s Chaos and Baker’s Transformation
  6. Altmetric Badge
    Chapter 5 Quantum Differential Cryptanalysis to the Block Ciphers
  7. Altmetric Badge
    Chapter 6 An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes of Multi-level Classification
  8. Altmetric Badge
    Chapter 7 Public Key Timed-Release Attribute-Based Encryption
  9. Altmetric Badge
    Chapter 8 Color Image Encryption in CIE L*a*b* Space
  10. Altmetric Badge
    Chapter 9 Discover Abnormal Behaviors Using HTTP Header Fields Measurement
  11. Altmetric Badge
    Chapter 10 Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis
  12. Altmetric Badge
    Chapter 11 A Lightweight Code-Based Authentication Protocol for RFID Systems
  13. Altmetric Badge
    Chapter 12 An Overview of Ad Hoc Network Security
  14. Altmetric Badge
    Chapter 13 Structural Analysis of IWA Social Network
  15. Altmetric Badge
    Chapter 14 A Differentially Private Method for Reward-Based Spatial Crowdsourcing
  16. Altmetric Badge
    Chapter 15 Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data
  17. Altmetric Badge
    Chapter 16 Trust Prediction with Trust Antecedent Framework Regularization
  18. Altmetric Badge
    Chapter 17 Trust Prediction Based on Interactive Relations Strength
  19. Altmetric Badge
    Chapter 18 You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud
  20. Altmetric Badge
    Chapter 19 Quantitative Evaluation Method of Cloud Security
  21. Altmetric Badge
    Chapter 20 A Large-Scale Distributed Sorting Algorithm Based on Cloud Computing
  22. Altmetric Badge
    Chapter 21 Analysis and Exploit of Directory Traversal Vulnerability on VMware
  23. Altmetric Badge
    Chapter 22 OpenStack Vulnerability Detection and Analysis
  24. Altmetric Badge
    Chapter 23 RICS-DFA: Reduced Input Character Set DFA for Memory-Efficient Regular Expression Matching
  25. Altmetric Badge
    Chapter 24 A Clustering Approach for Detecting Auto-generated Botnet Domains
  26. Altmetric Badge
    Chapter 25 Modeling of Mobile Communication Systems by Electromagnetic Theory in the Direct and Single Reflected Propagation Scenario
  27. Altmetric Badge
    Chapter 26 Bayesian Reliability Assessment Method for Single NC Machine Tool Under Zero Failures
  28. Altmetric Badge
    Chapter 27 MIRD: Trigram-Based M alicious URL Detection I mplanted with R andom D omain Name Recognition
  29. Altmetric Badge
    Chapter 28 A Novel NB-SVM-Based Sentiment Analysis Algorithm in Cross-Cultural Communication
  30. Altmetric Badge
    Chapter 29 Time-Varying Impulsive Anticontrol of Discrete-Time System
  31. Altmetric Badge
    Chapter 30 Leakage Prevention Method for Unstructured Data Based on Classification
  32. Altmetric Badge
    Chapter 31 Decryption and Forensic System for Encrypted iPhone Backup Files Based on Parallel Random Search
  33. Altmetric Badge
    Chapter 32 The Method and System Implementation of Unstructured Data Tracking and Forensics
  34. Altmetric Badge
    Chapter 33 The Design and Implementation of Data Security Management and Control Platform
  35. Altmetric Badge
    Chapter 34 A Data Recovery Method for NTFS Files System
  36. Altmetric Badge
    Chapter 35 Design and Implementation of Aircraft Pan-Tilt Control System Based on Mobile Terminal
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
2 X users
wikipedia
1 Wikipedia page

Readers on

mendeley
2 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applications and Techniques in Information Security
Published by
Springer Berlin Heidelberg, November 2015
DOI 10.1007/978-3-662-48683-2
ISBNs
978-3-66-248682-5, 978-3-66-248683-2
Editors

Niu, Wenjia, Li, Gang, Liu, Jiqiang, Tan, Jianlong, Guo, Li, Han, Zhen, Batten, Lynn

X Demographics

X Demographics

The data shown below were collected from the profiles of 2 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 2 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 2 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 50%
Unknown 1 50%
Readers by discipline Count As %
Computer Science 1 50%
Unknown 1 50%