↓ Skip to main content

Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems

Overview of attention for book
Cover of 'Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Recent Developments in Low-Level Software Security
  3. Altmetric Badge
    Chapter 2 Towards a C 2 I Platform for Combating the Cyber-Threat
  4. Altmetric Badge
    Chapter 3 Veracity, Plausibility, and Reputation
  5. Altmetric Badge
    Chapter 4 Another Fallen Hash-Based RFID Authentication Protocol
  6. Altmetric Badge
    Chapter 5 HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network
  7. Altmetric Badge
    Chapter 6 How to Break EAP-MD5
  8. Altmetric Badge
    Chapter 7 Privacy Preserving Social Network Publication on Bipartite Graphs
  9. Altmetric Badge
    Chapter 8 Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications
  10. Altmetric Badge
    Chapter 9 Privacy Preservation of User History Graph
  11. Altmetric Badge
    Chapter 10 HiPoLDS: A Security Policy Language for Distributed Systems
  12. Altmetric Badge
    Chapter 11 ROAC: A Role-Oriented Access Control Model
  13. Altmetric Badge
    Chapter 12 Optimal Parameters for Efficient Two-Party Computation Protocols
  14. Altmetric Badge
    Chapter 13 Assisting Server for Secure Multi-Party Computation
  15. Altmetric Badge
    Chapter 14 An Efficient Lattice-Based Secret Sharing Construction
  16. Altmetric Badge
    Chapter 15 On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems
  17. Altmetric Badge
    Chapter 16 Impossible Differential Cryptanalysis of Reduced-Round LBlock
  18. Altmetric Badge
    Chapter 17 Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
  19. Altmetric Badge
    Chapter 18 Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android
Attention for Chapter 17: Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Altmetric Badge

Mentioned by

twitter
1 X user

Readers on

mendeley
51 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
Chapter number 17
Book title
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems
Published in
Lecture notes in computer science, January 2012
DOI 10.1007/978-3-642-30955-7_17
Book ISBNs
978-3-64-230954-0, 978-3-64-230955-7
Authors

Johann Großschädl, Dan Page, Stefan Tillich

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 51 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Korea, Republic of 1 2%
India 1 2%
Unknown 49 96%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 16 31%
Student > Master 10 20%
Researcher 5 10%
Student > Bachelor 3 6%
Student > Doctoral Student 2 4%
Other 8 16%
Unknown 7 14%
Readers by discipline Count As %
Computer Science 30 59%
Social Sciences 4 8%
Engineering 4 8%
Mathematics 3 6%
Medicine and Dentistry 1 2%
Other 1 2%
Unknown 8 16%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 28 June 2012.
All research outputs
#15,246,403
of 22,669,724 outputs
Outputs from Lecture notes in computer science
#4,644
of 8,122 outputs
Outputs of similar age
#163,162
of 244,072 outputs
Outputs of similar age from Lecture notes in computer science
#268
of 490 outputs
Altmetric has tracked 22,669,724 research outputs across all sources so far. This one is in the 22nd percentile – i.e., 22% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,122 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 27th percentile – i.e., 27% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 244,072 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 21st percentile – i.e., 21% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 490 others from the same source and published within six weeks on either side of this one. This one is in the 22nd percentile – i.e., 22% of its contemporaries scored the same or lower than it.