↓ Skip to main content

Cryptology and Network Security

Overview of attention for book
Cover of 'Cryptology and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Differential Attacks on Generalized Feistel Schemes
  3. Altmetric Badge
    Chapter 2 Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation
  4. Altmetric Badge
    Chapter 3 Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?
  5. Altmetric Badge
    Chapter 4 Zero Knowledge Proofs from Ring-LWE
  6. Altmetric Badge
    Chapter 5 Zero Knowledge with Rubik’s Cubes and Non-abelian Groups
  7. Altmetric Badge
    Chapter 6 Efficient Modular NIZK Arguments from Shift and Product
  8. Altmetric Badge
    Chapter 7 Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model
  9. Altmetric Badge
    Chapter 8 Achieving Correctness in Fair Rational Secret Sharing
  10. Altmetric Badge
    Chapter 9 BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis
  11. Altmetric Badge
    Chapter 10 Resource Access Control in the Facebook Model
  12. Altmetric Badge
    Chapter 11 Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture
  13. Altmetric Badge
    Chapter 12 Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition
  14. Altmetric Badge
    Chapter 13 Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions
  15. Altmetric Badge
    Chapter 14 Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions
  16. Altmetric Badge
    Chapter 15 A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
  17. Altmetric Badge
    Chapter 16 Truncated Differential Analysis of Reduced-Round LBlock
  18. Altmetric Badge
    Chapter 17 How to Update Documents <Emphasis Type="Italic">Verifiably</Emphasis> in Searchable Symmetric Encryption
  19. Altmetric Badge
    Chapter 18 Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps
Attention for Chapter 17: How to Update Documents <Emphasis Type="Italic">Verifiably</Emphasis> in Searchable Symmetric Encryption
Altmetric Badge

Mentioned by

patent
1 patent

Readers on

mendeley
34 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
How to Update Documents <Emphasis Type="Italic">Verifiably</Emphasis> in Searchable Symmetric Encryption
Chapter number 17
Book title
Cryptology and Network Security
Published by
Springer, Cham, November 2013
DOI 10.1007/978-3-319-02937-5_17
Book ISBNs
978-3-31-902936-8, 978-3-31-902937-5
Authors

Kaoru Kurosawa, Yasuhiro Ohtaki, Kurosawa, Kaoru, Ohtaki, Yasuhiro

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 34 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 34 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 12 35%
Student > Master 3 9%
Lecturer 2 6%
Professor > Associate Professor 2 6%
Researcher 2 6%
Other 4 12%
Unknown 9 26%
Readers by discipline Count As %
Computer Science 19 56%
Mathematics 2 6%
Unspecified 1 3%
Physics and Astronomy 1 3%
Unknown 11 32%