Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
47
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,150
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Applied Cryptography and Network Security
other
Editor(s):
Feng Bao
,
Pierangela Samarati
,
Jianying Zhou
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Applied use of fungi
Author and book information
Book
ISBN (Print):
978-3-642-31283-0
ISBN (Electronic):
978-3-642-31284-7
Publication date (Print):
2012
DOI:
10.1007/978-3-642-31284-7
SO-VID:
b653ecd2-d74d-449d-be0c-fa561993ade0
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol
pp. 12
Breaking an Animated CAPTCHA Scheme
pp. 30
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens
pp. 48
RIKE: Using Revocable Identities to Support Key Escrow in PKIs
pp. 66
TreVisor
pp. 84
Authenticated Encryption: How Reordering Can Impact Performance
pp. 100
Length-Doubling Ciphers and Tweakable Ciphers
pp. 117
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
pp. 135
Security Enhancements by OR-Proof in Identity-Based Identification
pp. 153
Identity-Based Extractable Hash Proofs and Their Applications
pp. 171
On Structural Signatures for Tree Data Structures
pp. 188
Inner-Product Lossy Trapdoor Functions and Applications
pp. 206
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
pp. 224
Secure Accumulators from Euclidean Rings without Trusted Setup
pp. 241
Linear Fault Analysis of Block Ciphers
pp. 257
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
pp. 275
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions
pp. 293
Zero-Value Point Attacks on Kummer-Based Cryptosystem
pp. 311
PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
pp. 329
Wide Collisions in Practice
pp. 344
A General Construction for 1-Round δ-RMT and (0, δ)-SMT
pp. 363
A Prefiltering Approach to Regular Expression Matching for Network Security Systems
pp. 381
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic
pp. 400
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
pp. 418
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations
pp. 436
The Shy Mayor: Private Badges in GeoSocial Networks
pp. 473
A New Framework for Privacy of RFID Path Authentication
pp. 489
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol
pp. 507
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
pp. 526
SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment
pp. 544
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring
Similar content
4,150
A compressive data gathering method based on ElGamal cryptography
Authors:
X Yu
,
K. Dong
,
X Li
…
On Identity-Based Cryptography and Grid Computing
Authors:
H. C. LIM
,
M. J. B. Robshaw
,
H. S. Lim
Handbook of applied cryptography
Authors:
AJ Menezes
,
Alfred J. Menezes
,
A. MENEZES
…
See all similar
Cited by
2
Moore-Machine Filtering for Timed and Untimed Pattern Matching
Authors:
Masaki Waga
,
Ichiro Hasuo
An Unsupervised Approach to Detect Spam Campaigns that Use Botnets on Twitter
Authors:
Zhouhan Chen
,
Devika Subramanian
See all cited by