↓ Skip to main content

Information Security

Overview of attention for book
Cover of 'Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model
  3. Altmetric Badge
    Chapter 2 The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures
  4. Altmetric Badge
    Chapter 3 Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures
  5. Altmetric Badge
    Chapter 4 Graded Signatures
  6. Altmetric Badge
    Chapter 5 Dynamically Provisioning Isolation in Hierarchical Architectures
  7. Altmetric Badge
    Chapter 6 Factors Impacting the Effort Required to Fix Security Vulnerabilities
  8. Altmetric Badge
    Chapter 7 Software Security Maturity in Public Organisations
  9. Altmetric Badge
    Chapter 8 Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis
  10. Altmetric Badge
    Chapter 9 Automatic Search for Linear Trails of the SPECK Family
  11. Altmetric Badge
    Chapter 10 From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour
  12. Altmetric Badge
    Chapter 11 Oblivious PAKE: Efficient Handling of Password Trials
  13. Altmetric Badge
    Chapter 12 Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter
  14. Altmetric Badge
    Chapter 13 On the Efficiency of Multi-party Contract Signing Protocols
  15. Altmetric Badge
    Chapter 14 On the Provable Security of the Dragonfly Protocol
  16. Altmetric Badge
    Chapter 15 Multipath TCP IDS Evasion and Mitigation
  17. Altmetric Badge
    Chapter 16 Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage
  18. Altmetric Badge
    Chapter 17 Multi-user Searchable Encryption in the Cloud
  19. Altmetric Badge
    Chapter 18 CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency
  20. Altmetric Badge
    Chapter 19 General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps
  21. Altmetric Badge
    Chapter 20 Hashing into Jacobi Quartic Curves
  22. Altmetric Badge
    Chapter 21 Two Generic Methods of Analyzing Stream Ciphers
  23. Altmetric Badge
    Chapter 22 Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes
  24. Altmetric Badge
    Chapter 23 Bit Error Probability Evaluation of RO PUFs
  25. Altmetric Badge
    Chapter 24 Extracting Robust Keys from NAND Flash Physical Unclonable Functions
  26. Altmetric Badge
    Chapter 25 On Security of a White-Box Implementation of SHARK
  27. Altmetric Badge
    Chapter 26 GPU-Disasm: A GPU-Based X86 Disassembler
  28. Altmetric Badge
    Chapter 27 Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage
  29. Altmetric Badge
    Chapter 28 Improvement of Multi-bit Information Embedding Algorithm for Palette-Based Images
  30. Altmetric Badge
    Chapter 29 Efficient Ephemeral Elliptic Curve Cryptographic Keys
  31. Altmetric Badge
    Chapter 30 Distributed Parameter Generation for Bilinear Diffie Hellman Exponentiation and Applications
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (83rd percentile)
  • Good Attention Score compared to outputs of the same age and source (76th percentile)

Mentioned by

twitter
5 X users
wikipedia
1 Wikipedia page

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security
Published by
Lecture notes in computer science, January 2015
DOI 10.1007/978-3-319-23318-5
ISBNs
978-3-31-923317-8, 978-3-31-923318-5
Editors

Javier Lopez, Chris J. Mitchell

X Demographics

X Demographics

The data shown below were collected from the profiles of 5 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 21 100%

Demographic breakdown

Readers by professional status Count As %
Student > Master 1 5%
Unknown 20 95%
Readers by discipline Count As %
Computer Science 2 10%
Unknown 19 90%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 8. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 14 December 2017.
All research outputs
#4,315,953
of 23,577,761 outputs
Outputs from Lecture notes in computer science
#990
of 8,140 outputs
Outputs of similar age
#59,769
of 356,684 outputs
Outputs of similar age from Lecture notes in computer science
#61
of 258 outputs
Altmetric has tracked 23,577,761 research outputs across all sources so far. Compared to these this one has done well and is in the 81st percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,140 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has done well, scoring higher than 87% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 356,684 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 83% of its contemporaries.
We're also able to compare this research output to 258 others from the same source and published within six weeks on either side of this one. This one has done well, scoring higher than 76% of its contemporaries.