Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
49
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,475
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Applied Cryptography and Network Security
other
Editor(s):
Feng Bao
,
Pierangela Samarati
,
Jianying Zhou
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Applied use of fungi
Author and book information
Book
ISBN (Print):
978-3-642-31283-0
ISBN (Electronic):
978-3-642-31284-7
Publication date (Print):
2012
DOI:
10.1007/978-3-642-31284-7
SO-VID:
b653ecd2-d74d-449d-be0c-fa561993ade0
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol
pp. 12
Breaking an Animated CAPTCHA Scheme
pp. 30
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens
pp. 48
RIKE: Using Revocable Identities to Support Key Escrow in PKIs
pp. 66
TreVisor
pp. 84
Authenticated Encryption: How Reordering Can Impact Performance
pp. 100
Length-Doubling Ciphers and Tweakable Ciphers
pp. 117
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
pp. 135
Security Enhancements by OR-Proof in Identity-Based Identification
pp. 153
Identity-Based Extractable Hash Proofs and Their Applications
pp. 171
On Structural Signatures for Tree Data Structures
pp. 188
Inner-Product Lossy Trapdoor Functions and Applications
pp. 206
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification
pp. 224
Secure Accumulators from Euclidean Rings without Trusted Setup
pp. 241
Linear Fault Analysis of Block Ciphers
pp. 257
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
pp. 275
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions
pp. 293
Zero-Value Point Attacks on Kummer-Based Cryptosystem
pp. 311
PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
pp. 329
Wide Collisions in Practice
pp. 344
A General Construction for 1-Round δ-RMT and (0, δ)-SMT
pp. 363
A Prefiltering Approach to Regular Expression Matching for Network Security Systems
pp. 381
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic
pp. 400
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches
pp. 418
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations
pp. 436
The Shy Mayor: Private Badges in GeoSocial Networks
pp. 473
A New Framework for Privacy of RFID Path Authentication
pp. 489
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol
pp. 507
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud
pp. 526
SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment
pp. 544
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring
Similar content
3,475
Some recent research aspects of threshold cryptography
Authors:
Yvo Desmedt
Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography
Authors:
Erich Wenger
Physical Layer Cryptography and Cognitive Networks
Authors:
Lorenzo Mucchi
,
Luca Ronga
,
Enrico Del Re
…
See all similar
Cited by
2
Moore-Machine Filtering for Timed and Untimed Pattern Matching
Authors:
Masaki Waga
,
Ichiro Hasuo
An Unsupervised Approach to Detect Spam Campaigns that Use Botnets on Twitter
Authors:
Zhouhan Chen
,
Devika Subramanian
See all cited by