↓ Skip to main content

Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication

Overview of attention for book
Cover of 'Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Can Code Polymorphism Limit Information Leakage?
  3. Altmetric Badge
    Chapter 2 Mobile Electronic Identity: Securing Payment on Mobile Phones
  4. Altmetric Badge
    Chapter 3 Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
  5. Altmetric Badge
    Chapter 4 SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key
  6. Altmetric Badge
    Chapter 5 An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
  7. Altmetric Badge
    Chapter 6 Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
  8. Altmetric Badge
    Chapter 7 Formal Framework for the Evaluation of Waveform Resynchronization Algorithms
  9. Altmetric Badge
    Chapter 8 Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library
  10. Altmetric Badge
    Chapter 9 Information Leakage Discovery Techniques to Enhance Secure Chip Design
  11. Altmetric Badge
    Chapter 10 A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines
  12. Altmetric Badge
    Chapter 11 An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture
  13. Altmetric Badge
    Chapter 12 A Comparison of Post-Processing Techniques for Biased Random Number Generators
  14. Altmetric Badge
    Chapter 13 AES Variants Secure against Related-Key Differential and Boomerang Attacks
  15. Altmetric Badge
    Chapter 14 Leakage Squeezing Countermeasure against High-Order Attacks
  16. Altmetric Badge
    Chapter 15 Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault
  17. Altmetric Badge
    Chapter 16 Entropy of Selectively Encrypted Strings
  18. Altmetric Badge
    Chapter 17 Practical Attacks on HB and HB+ Protocols
  19. Altmetric Badge
    Chapter 18 Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
  20. Altmetric Badge
    Chapter 19 A SMS-Based Mobile Botnet Using Flooding Algorithm
  21. Altmetric Badge
    Chapter 20 FIRE: Fault Injection for Reverse Engineering
  22. Altmetric Badge
    Chapter 21 Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
  23. Altmetric Badge
    Chapter 22 Formal Analysis of Security Metrics and Risk
  24. Altmetric Badge
    Chapter 23 STORM - Collaborative Security Management Environment
  25. Altmetric Badge
    Chapter 24 Trust Agreement in Wireless Mesh Networks
  26. Altmetric Badge
    Chapter 25 Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network
  27. Altmetric Badge
    Chapter 26 Privacy Respecting Targeted Advertising for Social Networks
  28. Altmetric Badge
    Chapter 27 Privacy Protection for Smartphones: An Ontology-Based Firewall
  29. Altmetric Badge
    Chapter 28 A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban Area
Attention for Chapter 21: Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
Altmetric Badge

About this Attention Score

  • Average Attention Score compared to outputs of the same age
  • Above-average Attention Score compared to outputs of the same age and source (55th percentile)

Mentioned by

wikipedia
2 Wikipedia pages

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
14 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
Chapter number 21
Book title
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
Published in
Lecture notes in computer science, June 2011
DOI 10.1007/978-3-642-21040-2_21
Book ISBNs
978-3-64-221039-6, 978-3-64-221040-2
Authors

Zheng Gong, Marc X. Makkes

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 14 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 14 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 6 43%
Researcher 3 21%
Student > Bachelor 1 7%
Student > Master 1 7%
Other 1 7%
Other 0 0%
Unknown 2 14%
Readers by discipline Count As %
Engineering 6 43%
Computer Science 5 36%
Unknown 3 21%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 3. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 16 July 2020.
All research outputs
#7,486,067
of 22,880,691 outputs
Outputs from Lecture notes in computer science
#2,487
of 8,129 outputs
Outputs of similar age
#40,756
of 111,405 outputs
Outputs of similar age from Lecture notes in computer science
#12
of 65 outputs
Altmetric has tracked 22,880,691 research outputs across all sources so far. This one is in the 44th percentile – i.e., 44% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,129 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 54% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 111,405 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 32nd percentile – i.e., 32% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 65 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 55% of its contemporaries.