↓ Skip to main content

Information Security and Cryptology - ICISC 2003

Overview of attention for book
Cover of 'Information Security and Cryptology - ICISC 2003'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Binary Tree Encryption: Constructions and Applications
  3. Altmetric Badge
    Chapter 2 A Separable Threshold Ring Signature Scheme
  4. Altmetric Badge
    Chapter 3 On the Security of a Group Signature Scheme with Forward Security
  5. Altmetric Badge
    Chapter 4 An Efficient Strong Designated Verifier Signature Scheme
  6. Altmetric Badge
    Chapter 5 Sound Computational Interpretation of Formal Encryption with Composed Keys
  7. Altmetric Badge
    Chapter 6 On the Security of a New Variant of OMAC
  8. Altmetric Badge
    Chapter 7 New Methods to Construct Cheating Immune Functions
  9. Altmetric Badge
    Chapter 8 Yet Another Definition of Weak Collision Resistance and Its Analysis
  10. Altmetric Badge
    Chapter 9 Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2
  11. Altmetric Badge
    Chapter 10 A General Expansion Method Using Efficient Endomorphisms
  12. Altmetric Badge
    Chapter 11 Design of Bit Parallel Multiplier with Lower Time Complexity
  13. Altmetric Badge
    Chapter 12 Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks
  14. Altmetric Badge
    Chapter 13 Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion
  15. Altmetric Badge
    Chapter 14 Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks
  16. Altmetric Badge
    Chapter 15 Extended Role Based Access Control and Procedural Restrictions
  17. Altmetric Badge
    Chapter 16 Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System
  18. Altmetric Badge
    Chapter 17 Secure Double Auction Protocols with Full Privacy Protection
  19. Altmetric Badge
    Chapter 18 Sealed-Bid Auctions with Efficient Bids
  20. Altmetric Badge
    Chapter 19 Providing Receipt-Freeness in Mixnet-Based Voting Protocols
  21. Altmetric Badge
    Chapter 20 Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
  22. Altmetric Badge
    Chapter 21 Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks
  23. Altmetric Badge
    Chapter 22 Analysis of the Bounds for Linear Block Codes in Watermark Channel
  24. Altmetric Badge
    Chapter 23 Security Analysis of Some Proxy Signatures
  25. Altmetric Badge
    Chapter 24 A More Secure and Efficacious TTS Signature Scheme
  26. Altmetric Badge
    Chapter 25 An Efficient Revocation Algorithm in Group Signatures
  27. Altmetric Badge
    Chapter 26 Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
  28. Altmetric Badge
    Chapter 27 Group Oriented Cryptosystems Based on Linear Access Structures
  29. Altmetric Badge
    Chapter 28 A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters
  30. Altmetric Badge
    Chapter 29 Non-interactive Deniable Ring Authentication
  31. Altmetric Badge
    Chapter 30 Differential Cryptanalysis of TEA and XTEA
  32. Altmetric Badge
    Chapter 31 A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher
  33. Altmetric Badge
    Chapter 32 New Block Cipher: ARIA
  34. Altmetric Badge
    Chapter 33 Truncated Differential Attacks on 8-Round CRYPTON
Attention for Chapter 28: A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age and source

Mentioned by

q&a
1 Q&A thread

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
22 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters
Chapter number 28
Book title
Information Security and Cryptology - ICISC 2003
Published in
Lecture notes in computer science, January 2004
DOI 10.1007/978-3-540-24691-6_28
Book ISBNs
978-3-54-021376-5, 978-3-54-024691-6
Authors

Raylin Tso, Ying Miao, Eiji Okamoto

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 22 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Korea, Republic of 1 5%
Unknown 21 95%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 32%
Student > Master 5 23%
Professor > Associate Professor 2 9%
Professor 2 9%
Researcher 2 9%
Other 2 9%
Unknown 2 9%
Readers by discipline Count As %
Computer Science 18 82%
Physics and Astronomy 1 5%
Unknown 3 14%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 27 January 2012.
All research outputs
#12,852,960
of 22,662,201 outputs
Outputs from Lecture notes in computer science
#3,773
of 8,123 outputs
Outputs of similar age
#109,650
of 132,841 outputs
Outputs of similar age from Lecture notes in computer science
#74
of 114 outputs
Altmetric has tracked 22,662,201 research outputs across all sources so far. This one is in the 42nd percentile – i.e., 42% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,123 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 52% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 132,841 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 17th percentile – i.e., 17% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 114 others from the same source and published within six weeks on either side of this one. This one is in the 34th percentile – i.e., 34% of its contemporaries scored the same or lower than it.