↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case
  3. Altmetric Badge
    Chapter 2 Optimized χ 2 -Attack against RC6
  4. Altmetric Badge
    Chapter 3 Anonymity-Enhanced Pseudonym System
  5. Altmetric Badge
    Chapter 4 Using Feedback to Improve Masquerade Detection
  6. Altmetric Badge
    Chapter 5 Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services
  7. Altmetric Badge
    Chapter 6 An IP Traceback Scheme Integrating DPM and PPM
  8. Altmetric Badge
    Chapter 7 Improved Scalable Hash Chain Traversal
  9. Altmetric Badge
    Chapter 8 Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
  10. Altmetric Badge
    Chapter 9 On the Security of Two Threshold Signature Schemes with Traceable Signers
  11. Altmetric Badge
    Chapter 10 Proxy and Threshold One-Time Signatures
  12. Altmetric Badge
    Chapter 11 A Threshold GQ Signature Scheme
  13. Altmetric Badge
    Chapter 12 Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
  14. Altmetric Badge
    Chapter 13 A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme
  15. Altmetric Badge
    Chapter 14 Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems
  16. Altmetric Badge
    Chapter 15 An Authorization Model for E-consent Requirement in a Health Care Application
  17. Altmetric Badge
    Chapter 16 PLI: A New Framework to Protect Digital Content for P2P Networks
  18. Altmetric Badge
    Chapter 17 Improved Algebraic Traitor Tracing Scheme
  19. Altmetric Badge
    Chapter 18 Common Vulnerability Markup Language
  20. Altmetric Badge
    Chapter 19 Trust on Web Browser: Attack vs. Defense
  21. Altmetric Badge
    Chapter 20 Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
  22. Altmetric Badge
    Chapter 21 Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party
  23. Altmetric Badge
    Chapter 22 Using OCSP to Secure Certificate-Using Transactions in M-commerce
  24. Altmetric Badge
    Chapter 23 Differential Fault Analysis on A.E.S
  25. Altmetric Badge
    Chapter 24 Side-Channel Attack on Substitution Blocks
  26. Altmetric Badge
    Chapter 25 Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation
  27. Altmetric Badge
    Chapter 26 A Fast Correlation Attack for LFSR-Based Stream Ciphers
  28. Altmetric Badge
    Chapter 27 Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient
  29. Altmetric Badge
    Chapter 28 An Efficient Tree-Based Group Key Agreement Using Bilinear Map
  30. Altmetric Badge
    Chapter 29 A Key Recovery Mechanism for Reliable Group Key Management
  31. Altmetric Badge
    Chapter 30 Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model
  32. Altmetric Badge
    Chapter 31 Efficient Distributed Signcryption Scheme as Group Signcryption
  33. Altmetric Badge
    Chapter 32 Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Applied Cryptography and Network Security
Published by
Springer Berlin Heidelberg, October 2003
DOI 10.1007/b13996
ISBNs
978-3-54-020208-0, 978-3-54-045203-4
Editors

Zhou, Jianying, Yung, Moti, Han, Yongfei

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 100%
Readers by discipline Count As %
Medicine and Dentistry 1 100%