↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On Known and New Differentially Uniform Functions
  3. Altmetric Badge
    Chapter 2 New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
  4. Altmetric Badge
    Chapter 3 Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks
  5. Altmetric Badge
    Chapter 4 Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation
  6. Altmetric Badge
    Chapter 5 Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis
  7. Altmetric Badge
    Chapter 6 State Convergence in the Initialisation of Stream Ciphers
  8. Altmetric Badge
    Chapter 7 On Maximum Differential Probability of Generalized Feistel
  9. Altmetric Badge
    Chapter 8 Double SP-Functions: Enhanced Generalized Feistel Networks
  10. Altmetric Badge
    Chapter 9 Algebraic Techniques in Differential Cryptanalysis Revisited
  11. Altmetric Badge
    Chapter 10 Faster and Smoother – VSH Revisited
  12. Altmetric Badge
    Chapter 11 Cryptanalysis of the Compression Function of SIMD
  13. Altmetric Badge
    Chapter 12 Electronic Cash with Anonymous User Suspension
  14. Altmetric Badge
    Chapter 13 T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity
  15. Altmetric Badge
    Chapter 14 Application-Binding Protocol in the User Centric Smart Card Ownership Model
  16. Altmetric Badge
    Chapter 15 Security in Depth through Smart Space Cascades
  17. Altmetric Badge
    Chapter 16 GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems
  18. Altmetric Badge
    Chapter 17 An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem
  19. Altmetric Badge
    Chapter 18 DMIPS - Defensive Mechanism against IP Spoofing
  20. Altmetric Badge
    Chapter 19 Provably Secure Key Assignment Schemes from Factoring
  21. Altmetric Badge
    Chapter 20 Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key
  22. Altmetric Badge
    Chapter 21 Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
  23. Altmetric Badge
    Chapter 22 Identity-Based Server-Aided Decryption
  24. Altmetric Badge
    Chapter 23 A Generic Variant of NIST’s KAS2 Key Agreement Protocol
  25. Altmetric Badge
    Chapter 24 A Single Key Pair is Adequate for the Zheng Signcryption
  26. Altmetric Badge
    Chapter 25 Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization
  27. Altmetric Badge
    Chapter 26 Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)
  28. Altmetric Badge
    Chapter 27 Compliance or Security, What Cost? (Poster)
  29. Altmetric Badge
    Chapter 28 Preimage Attacks on Full-ARIRANG (Poster)
  30. Altmetric Badge
    Chapter 29 Finding Collisions for Reduced Luffa-256 v2 (Poster)
  31. Altmetric Badge
    Chapter 30 Improved Security Analysis of Fugue-256 (Poster)
  32. Altmetric Badge
    Chapter 31 Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)
  33. Altmetric Badge
    Chapter 32 Toward Dynamic Attribute-Based Signcryption (Poster)
  34. Altmetric Badge
    Chapter 33 A Verifiable Distributed Oblivious Transfer Protocol
  35. Altmetric Badge
    Chapter 34 Impracticality of Efficient PVSS in Real Life Security Standard (Poster)
  36. Altmetric Badge
    Chapter 35 Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster)
  37. Altmetric Badge
    Chapter 36 Erratum: Compliance or Security, What Cost? (Poster)
Attention for Chapter 27: Compliance or Security, What Cost? (Poster)
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
25 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Compliance or Security, What Cost? (Poster)
Chapter number 27
Book title
Information Security and Privacy
Published by
Springer Berlin Heidelberg, January 2011
DOI 10.1007/978-3-642-22497-3_27
Book ISBNs
978-3-64-222496-6, 978-3-64-222497-3
Authors

Craig Wright, Wright, Craig

Editors

Udaya Parampalli, Philip Hawkes

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 25 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 1 4%
Unknown 24 96%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 32%
Student > Master 5 20%
Lecturer 2 8%
Researcher 2 8%
Student > Doctoral Student 1 4%
Other 4 16%
Unknown 3 12%
Readers by discipline Count As %
Computer Science 19 76%
Physics and Astronomy 1 4%
Social Sciences 1 4%
Medicine and Dentistry 1 4%
Unknown 3 12%