Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
34
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,085
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Information Security and Privacy
other
Editor(s):
Huaxiong Wang
,
Josef Pieprzyk
,
Vijay Varadharajan
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Author and book information
Book
ISBN (Print):
978-3-540-22379-5
ISBN (Electronic):
978-3-540-27800-9
Publication date (Print):
2004
DOI:
10.1007/b98755
SO-VID:
2369deb9-3892-49ba-b1d4-6c2d66c874d2
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Multi-service Oriented Broadcast Encryption
pp. 12
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
pp. 24
Linear Code Implies Public-Key Traitor Tracing with Revocation
pp. 36
TTS without Revocation Capability Secure Against CCA2
pp. 50
Single Database Private Information Retrieval with Logarithmic Communication
pp. 62
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
pp. 74
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
pp. 86
NGSCB: A Trusted Open System
pp. 98
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
pp. 110
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
pp. 123
The Related-Key Rectangle Attack – Application to SHACAL-1
pp. 137
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
pp. 149
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
pp. 157
Analysis of a Conference Scheme Under Active and Passive Attacks
pp. 164
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
pp. 176
Analysis and Improvement of Micali’s Fair Contract Signing Protocol
pp. 188
Digital Signature Schemes with Domain Parameters
pp. 212
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
pp. 224
How to Re-use Round Function in Super-Pseudorandom Permutation
pp. 236
How to Remove MAC from DHIES
pp. 248
Symmetric Key Authentication Services Revisited
pp. 262
Improvements to the Point Halving Algorithm
pp. 289
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
pp. 301
A Mobile Agent System Providing Offer Privacy
pp. 313
Identity-Based Strong Designated Verifier Signature Schemes
pp. 336
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups
pp. 348
Convertible Nominative Signatures
pp. 358
Protocols with Security Proofs for Mobile Applications
pp. 370
Secure Bilinear Diffie-Hellman Bits
pp. 379
Weak Property of Malleability in NTRUSign
pp. 391
Information Security Risk Assessment, Aggregation, and Mitigation
pp. 402
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
pp. 414
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
pp. 427
Unconditionally Secure Encryption Under Strong Attacks
pp. 440
ManTiCore: Encryption with Joint Cipher-State Authentication
pp. 454
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
pp. 466
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
pp. 478
Fault Attacks on Signature Schemes
Similar content
2,085
Rehabilitation information systems: What we know and what we want
Authors:
SFM Baigi
,
M Sarbaz
,
D Sobhani-Rad
…
Population genetics-informed meta-analysis in seven genes associated with risk to dengue fever disease
Authors:
Isabelle Casademont
,
Marisa Oliveira
,
Diana Saraiva
…
Configural information in facial expression perception.
Authors:
Andrew Calder
,
Andrew Young
,
Jill Keane
…
See all similar
Cited by
2
Statistical Database Auditing Without Query Denial Threat
Authors:
Haibing Lu
,
Jaideep Vaidya
,
Vijayalakshmi Atluri
…
Development of Secure XML Data Warehouses with QVT
Authors:
E Marcos
,
C. Blanco
,
E. Fernández-Medina
…
See all cited by