↓ Skip to main content

Information Security and Cryptology

Overview of attention for book
Cover of 'Information Security and Cryptology'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 An Efficient Privacy-Preserving E-coupon System
  3. Altmetric Badge
    Chapter 2 Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications
  4. Altmetric Badge
    Chapter 3 Security of Direct Anonymous Authentication Using TPM 2.0 Signature
  5. Altmetric Badge
    Chapter 4 Revocation in Publicly Verifiable Outsourced Computation
  6. Altmetric Badge
    Chapter 5 Private Aggregation with Custom Collusion Tolerance
  7. Altmetric Badge
    Chapter 6 Ring Signatures of Constant Size Without Random Oracles
  8. Altmetric Badge
    Chapter 7 Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control
  9. Altmetric Badge
    Chapter 8 Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge
  10. Altmetric Badge
    Chapter 9 A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC
  11. Altmetric Badge
    Chapter 10 Optimal Proximity Proofs
  12. Altmetric Badge
    Chapter 11 Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions
  13. Altmetric Badge
    Chapter 12 Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization
  14. Altmetric Badge
    Chapter 13 Fully Homomorphic Encryption with Auxiliary Inputs
  15. Altmetric Badge
    Chapter 14 Trapdoors for Ideal Lattices with Applications
  16. Altmetric Badge
    Chapter 15 Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails
  17. Altmetric Badge
    Chapter 16 The Boomerang Attacks on BLAKE and BLAKE2
  18. Altmetric Badge
    Chapter 17 Second Preimage Analysis of Whirlwind
  19. Altmetric Badge
    Chapter 18 Boomerang Attack on Step-Reduced SHA-512
  20. Altmetric Badge
    Chapter 19 Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
  21. Altmetric Badge
    Chapter 20 Rig: A Simple, Secure and Flexible Design for Password Hashing
  22. Altmetric Badge
    Chapter 21 Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption
  23. Altmetric Badge
    Chapter 22 Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
  24. Altmetric Badge
    Chapter 23 Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks
  25. Altmetric Badge
    Chapter 24 Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
  26. Altmetric Badge
    Chapter 25 A Note on Diem’s Proof
  27. Altmetric Badge
    Chapter 26 Stand-by Attacks on E-ID Password Authentication
  28. Altmetric Badge
    Chapter 27 Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
  29. Altmetric Badge
    Chapter 28 A Lightweight Security Isolation Approach for Virtual Machines Deployment
  30. Altmetric Badge
    Chapter 29 A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors
Attention for Chapter 27: Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
Altmetric Badge

About this Attention Score

  • Above-average Attention Score compared to outputs of the same age (54th percentile)
  • Average Attention Score compared to outputs of the same age and source

Mentioned by

wikipedia
1 Wikipedia page

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps
Chapter number 27
Book title
Information Security and Cryptology
Published in
Lecture notes in computer science, December 2014
DOI 10.1007/978-3-319-16745-9_27
Book ISBNs
978-3-31-916744-2, 978-3-31-916745-9
Authors

Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Suarez-Tangil, Guillermo, Tapiador, Juan E., Peris-Lopez, Pedro

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Germany 1 5%
Unknown 20 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 33%
Lecturer 2 10%
Student > Bachelor 2 10%
Lecturer > Senior Lecturer 1 5%
Other 1 5%
Other 3 14%
Unknown 5 24%
Readers by discipline Count As %
Computer Science 11 52%
Unspecified 1 5%
Pharmacology, Toxicology and Pharmaceutical Science 1 5%
Psychology 1 5%
Engineering 1 5%
Other 1 5%
Unknown 5 24%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 30 January 2016.
All research outputs
#7,471,842
of 22,842,950 outputs
Outputs from Lecture notes in computer science
#2,487
of 8,127 outputs
Outputs of similar age
#105,895
of 355,043 outputs
Outputs of similar age from Lecture notes in computer science
#137
of 302 outputs
Altmetric has tracked 22,842,950 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,127 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 55% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 355,043 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 54% of its contemporaries.
We're also able to compare this research output to 302 others from the same source and published within six weeks on either side of this one. This one is in the 49th percentile – i.e., 49% of its contemporaries scored the same or lower than it.