↓ Skip to main content

Information Security Applications

Overview of attention for book
Cover of 'Information Security Applications'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM
  3. Altmetric Badge
    Chapter 2 Turn On the Lights: User Behavior in Game Environment Using CPTED
  4. Altmetric Badge
    Chapter 3 QR Code Watermarking for Digital Images
  5. Altmetric Badge
    Chapter 4 FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking
  6. Altmetric Badge
    Chapter 5 DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN
  7. Altmetric Badge
    Chapter 6 A Secure and Self-tallying E-voting System Based on Blockchain
  8. Altmetric Badge
    Chapter 7 An Extended CTRT for AES-256
  9. Altmetric Badge
    Chapter 8 A Blind Ring Signature Based on the Short Integer Solution Problem
  10. Altmetric Badge
    Chapter 9 A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
  11. Altmetric Badge
    Chapter 10 Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR
  12. Altmetric Badge
    Chapter 11 Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing
  13. Altmetric Badge
    Chapter 12 Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression
  14. Altmetric Badge
    Chapter 13 Timed-Release Encryption with Master Time Bound Key
  15. Altmetric Badge
    Chapter 14 Secret Sharing on Evolving Multi-level Access Structure
  16. Altmetric Badge
    Chapter 15 Strengthened PAKE Protocols Secure Against Malicious Private Key Generator
  17. Altmetric Badge
    Chapter 16 Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof
  18. Altmetric Badge
    Chapter 17 Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs)
  19. Altmetric Badge
    Chapter 18 CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network
  20. Altmetric Badge
    Chapter 19 A New Password Cracking Model with Generative Adversarial Networks
  21. Altmetric Badge
    Chapter 20 Is It Possible to Hide My Key into Deep Neural Network?
  22. Altmetric Badge
    Chapter 21 RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices
  23. Altmetric Badge
    Chapter 22 On the Automation of Security Testing for IoT Constrained Scenarios
  24. Altmetric Badge
    Chapter 23 Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
  25. Altmetric Badge
    Chapter 24 Ring-LWE on 8-Bit AVR Embedded Processor
  26. Altmetric Badge
    Chapter 25 Low-Noise LLC Side-Channel Attack with Perf
  27. Altmetric Badge
    Chapter 26 Optimized SIKE Round 2 on 64-bit ARM
  28. Altmetric Badge
    Chapter 27 Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea
  29. Altmetric Badge
    Chapter 28 An SGX-Based Key Management Framework for Data Centric Networking
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
8 X users
peer_reviews
1 peer review site

Citations

dimensions_citation
1 Dimensions
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security Applications
Published by
Springer International Publishing, April 2020
DOI 10.1007/978-3-030-39303-8
ISBNs
978-3-03-039302-1, 978-3-03-039303-8
Editors

You, Ilsun

X Demographics

X Demographics

The data shown below were collected from the profiles of 8 X users who shared this research output. Click here to find out more about how the information was compiled.