↓ Skip to main content

Information and Communications Security

Overview of attention for book
Cover of 'Information and Communications Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
  3. Altmetric Badge
    Chapter 2 A Robust and Secure RFID-Based Pedigree System (Short Paper)
  4. Altmetric Badge
    Chapter 3 A Topological Condition for Solving Fair Exchange in Byzantine Environments
  5. Altmetric Badge
    Chapter 4 A Security Analysis of the Precise Time Protocol (Short Paper)
  6. Altmetric Badge
    Chapter 5 An Identity-Based Proxy Signature Scheme from Pairings
  7. Altmetric Badge
    Chapter 6 Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper)
  8. Altmetric Badge
    Chapter 7 Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)
  9. Altmetric Badge
    Chapter 8 Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size
  10. Altmetric Badge
    Chapter 9 Trace-Driven Cache Attacks on AES (Short Paper)
  11. Altmetric Badge
    Chapter 10 A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols
  12. Altmetric Badge
    Chapter 11 Defining and Measuring Policy Coverage in Testing Access Control Policies
  13. Altmetric Badge
    Chapter 12 Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper)
  14. Altmetric Badge
    Chapter 13 An Operating System Design for the Security Architecture for Microprocessors
  15. Altmetric Badge
    Chapter 14 Point-Based Trust: Define How Much Privacy Is Worth
  16. Altmetric Badge
    Chapter 15 Efficient Protocols for Privacy Preserving Matching Against Distributed Datasets
  17. Altmetric Badge
    Chapter 16 Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)
  18. Altmetric Badge
    Chapter 17 An Anonymous Authentication Scheme for Identification Card
  19. Altmetric Badge
    Chapter 18 A Wireless Covert Channel on Smart Cards (Short Paper)
  20. Altmetric Badge
    Chapter 19 From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution
  21. Altmetric Badge
    Chapter 20 Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)
  22. Altmetric Badge
    Chapter 21 An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper)
  23. Altmetric Badge
    Chapter 22 Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario
  24. Altmetric Badge
    Chapter 23 An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)
  25. Altmetric Badge
    Chapter 24 Provably Correct Runtime Enforcement of Non-interference Properties
  26. Altmetric Badge
    Chapter 25 An Attack on SMC-Based Software Protection
  27. Altmetric Badge
    Chapter 26 Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)
  28. Altmetric Badge
    Chapter 27 Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic
  29. Altmetric Badge
    Chapter 28 Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards
  30. Altmetric Badge
    Chapter 29 Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
  31. Altmetric Badge
    Chapter 30 Seifert’s RSA Fault Attack: Simplified Analysis and Generalizations
  32. Altmetric Badge
    Chapter 31 The Fairness of Perfect Concurrent Signatures
  33. Altmetric Badge
    Chapter 32 Secure Set Membership Using 3Sat
  34. Altmetric Badge
    Chapter 33 Left-to-Right Signed-Bit τ -Adic Representations of n Integers (Short Paper)
  35. Altmetric Badge
    Chapter 34 Universal Designated Verifier Signature Without Delegatability
  36. Altmetric Badge
    Chapter 35 Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper)
  37. Altmetric Badge
    Chapter 36 A Fast RSA Implementation on Itanium 2 Processor
  38. Altmetric Badge
    Chapter 37 Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)
  39. Altmetric Badge
    Chapter 38 Threshold Implementations Against Side-Channel Attacks and Glitches
  40. Altmetric Badge
    Chapter 39 Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)
Attention for Chapter 39: Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)
Altmetric Badge

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
20 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)
Chapter number 39
Book title
Information and Communications Security
Published by
Springer, Berlin, Heidelberg, December 2006
DOI 10.1007/11935308_39
Book ISBNs
978-3-54-049496-6, 978-3-54-049497-3
Authors

Gu Xiaozhuo, Li Yufeng, Yang Jianzu, Lan Julong, Xiaozhuo, Gu, Yufeng, Li, Jianzu, Yang, Julong, Lan

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 20 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 20 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 35%
Student > Master 5 25%
Researcher 2 10%
Professor 1 5%
Other 1 5%
Other 2 10%
Unknown 2 10%
Readers by discipline Count As %
Computer Science 17 85%
Physics and Astronomy 1 5%
Unknown 2 10%