↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Deterministic Algorithm for Computing Divisors in an Interval
  3. Altmetric Badge
    Chapter 2 Reusable Fuzzy Extractor from LWE
  4. Altmetric Badge
    Chapter 3 A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al. ’s Construction
  5. Altmetric Badge
    Chapter 4 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
  6. Altmetric Badge
    Chapter 5 Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority
  7. Altmetric Badge
    Chapter 6 Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems
  8. Altmetric Badge
    Chapter 7 Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS
  9. Altmetric Badge
    Chapter 8 Robust Multiparty Computation with Faster Verification Time
  10. Altmetric Badge
    Chapter 9 Distributed Time-Memory Tradeoff Attacks on Ciphers
  11. Altmetric Badge
    Chapter 10 New Iterated RC4 Key Correlations
  12. Altmetric Badge
    Chapter 11 A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers
  13. Altmetric Badge
    Chapter 12 Differential Attacks on Reduced Round LILLIPUT
  14. Altmetric Badge
    Chapter 13 Bounds on Differential and Linear Branch Number of Permutations
  15. Altmetric Badge
    Chapter 14 Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key
  16. Altmetric Badge
    Chapter 15 Forward-Secure Linkable Ring Signatures
  17. Altmetric Badge
    Chapter 16 Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem
  18. Altmetric Badge
    Chapter 17 Private Functional Signatures: Definition and Construction
  19. Altmetric Badge
    Chapter 18 Linkable Group Signature for Auditing Anonymous Communication
  20. Altmetric Badge
    Chapter 19 Auditable Hierarchy-Private Public-Key Encryption
  21. Altmetric Badge
    Chapter 20 Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions
  22. Altmetric Badge
    Chapter 21 Anonymous Identity-Based Encryption with Identity Recovery
  23. Altmetric Badge
    Chapter 22 Asymmetric Subversion Attacks on Signature Schemes
  24. Altmetric Badge
    Chapter 23 Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing
  25. Altmetric Badge
    Chapter 24 Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing
  26. Altmetric Badge
    Chapter 25 Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties
  27. Altmetric Badge
    Chapter 26 Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC’08
  28. Altmetric Badge
    Chapter 27 Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage
  29. Altmetric Badge
    Chapter 28 Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes
  30. Altmetric Badge
    Chapter 29 Lattice-Based Universal Accumulator with Nonmembership Arguments
  31. Altmetric Badge
    Chapter 30 Lattice-Based Dual Receiver Encryption and More
  32. Altmetric Badge
    Chapter 31 Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model
  33. Altmetric Badge
    Chapter 32 Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)
  34. Altmetric Badge
    Chapter 33 Secure Contactless Payment
  35. Altmetric Badge
    Chapter 34 New Attacks and Secure Design for Anonymous Distance-Bounding
  36. Altmetric Badge
    Chapter 35 Automatically Identifying Security Bug Reports via Multitype Features Analysis
  37. Altmetric Badge
    Chapter 36 A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks
  38. Altmetric Badge
    Chapter 37 TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller
  39. Altmetric Badge
    Chapter 38 Fast Lottery-Based Micropayments for Decentralized Currencies
  40. Altmetric Badge
    Chapter 39 Z-Channel: Scalable and Efficient Scheme in Zerocash
  41. Altmetric Badge
    Chapter 40 Revisiting the Incentive Mechanism of Bitcoin-NG
  42. Altmetric Badge
    Chapter 41 Decentralized Blacklistable Anonymous Credentials with Reputation
  43. Altmetric Badge
    Chapter 42 Revocable Certificateless Encryption with Ciphertext Evolution
  44. Altmetric Badge
    Chapter 43 A New Encryption Scheme Based on Rank Metric Codes
  45. Altmetric Badge
    Chapter 44 Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing
  46. Altmetric Badge
    Chapter 45 Live Path CFI Against Control Flow Hijacking Attacks
  47. Altmetric Badge
    Chapter 46 Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017
  48. Altmetric Badge
    Chapter 47 Improving the BKZ Reduction Algorithm by Quick Reordering Technique
  49. Altmetric Badge
    Chapter 48 ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps
  50. Altmetric Badge
    Chapter 49 Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation
  51. Altmetric Badge
    Chapter 50 Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction
  52. Altmetric Badge
    Chapter 51 CRT-KPS: A Key Predistribution Schemes Using CRT
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

patent
8 patents

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
9 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Privacy
Published by
Springer International Publishing, June 2018
DOI 10.1007/978-3-319-93638-3
ISBNs
978-3-31-993637-6, 978-3-31-993638-3
Editors

Susilo, Willy, Yang, Guomin

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 9 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 9 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 22%
Student > Master 2 22%
Lecturer > Senior Lecturer 1 11%
Unknown 4 44%
Readers by discipline Count As %
Computer Science 3 33%
Decision Sciences 1 11%
Engineering 1 11%
Unknown 4 44%