↓ Skip to main content

Trusted Computing and Information Security

Overview of attention for book
Cover of 'Trusted Computing and Information Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Generative Image Steganography Based on GANs
  3. Altmetric Badge
    Chapter 2 Partial Blind Proxy Re-signature Scheme for Mobile Internet
  4. Altmetric Badge
    Chapter 3 Information Flow-Based Security Construction for Compositional Interface Automata
  5. Altmetric Badge
    Chapter 4 Provably Secure Server-Assisted Verification Threshold Proxy Re-signature Scheme
  6. Altmetric Badge
    Chapter 5 ReJection: A AST-Based Reentrancy Vulnerability Detection Method
  7. Altmetric Badge
    Chapter 6 Identity Authentication Under Internet of Everything Based on Edge Computing
  8. Altmetric Badge
    Chapter 7 STC: Improving the Performance of Virtual Machines Based on Task Classification
  9. Altmetric Badge
    Chapter 8 A Method for Realizing Covert Communication at Router Driving Layer
  10. Altmetric Badge
    Chapter 9 A Secure Multi-party Signature Scheme Based on Trust Mechanism
  11. Altmetric Badge
    Chapter 10 Virtual FPGA Placement with an Efficient Ant Colony Optimization
  12. Altmetric Badge
    Chapter 11 Identity-Based Threshold Group Signature Scheme of Blockchain Verification
  13. Altmetric Badge
    Chapter 12 ByteDroid: Android Malware Detection Using Deep Learning on Bytecode Sequences
  14. Altmetric Badge
    Chapter 13 Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation
  15. Altmetric Badge
    Chapter 14 Research on Software Network Key Nodes Mining Methods Based on Complex Network
  16. Altmetric Badge
    Chapter 15 Research and Development of TPM Virtualization
  17. Altmetric Badge
    Chapter 16 A Secure Certificateless Identity Authentication Scheme Based on Blockchain
  18. Altmetric Badge
    Chapter 17 A Trust-Based Security Research Method for Internet of Things Terminal
  19. Altmetric Badge
    Chapter 18 A QoS&SLA-Driven Multifaceted Trust Model for Cloud Computing
  20. Altmetric Badge
    Chapter 19 A Lossless Data Hiding Scheme in Public Key Encrypted Domain Based on Homomorphic Key-Switching
  21. Altmetric Badge
    Chapter 20 A Detection Approach for Buffer Overflow Vulnerability Based on Data Control Flow Graph
  22. Altmetric Badge
    Chapter 21 Outsourced Data Integrity Auditing for Efficient Batch Dynamic Updates
  23. Altmetric Badge
    Chapter 22 Secure Personal Health Records Sharing Based on Blockchain and IPFS
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Trusted Computing and Information Security
Published by
Springer Singapore, May 2020
DOI 10.1007/978-981-15-3418-8
ISBNs
978-9-81-153417-1, 978-9-81-153418-8
Editors

Han, Weili, Zhu, Liehuang, Yan, Fei

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Professor > Associate Professor 1 33%
Lecturer 1 33%
Student > Master 1 33%
Readers by discipline Count As %
Computer Science 2 67%
Unknown 1 33%