Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
32
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,808
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Information Security and Privacy
other
Editor(s):
Huaxiong Wang
,
Josef Pieprzyk
,
Vijay Varadharajan
Publication date
(Print):
2004
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Author and book information
Book
ISBN (Print):
978-3-540-22379-5
ISBN (Electronic):
978-3-540-27800-9
Publication date (Print):
2004
DOI:
10.1007/b98755
SO-VID:
2369deb9-3892-49ba-b1d4-6c2d66c874d2
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Multi-service Oriented Broadcast Encryption
pp. 12
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
pp. 24
Linear Code Implies Public-Key Traitor Tracing with Revocation
pp. 36
TTS without Revocation Capability Secure Against CCA2
pp. 50
Single Database Private Information Retrieval with Logarithmic Communication
pp. 62
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
pp. 74
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
pp. 86
NGSCB: A Trusted Open System
pp. 98
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
pp. 110
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
pp. 123
The Related-Key Rectangle Attack – Application to SHACAL-1
pp. 137
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
pp. 149
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
pp. 157
Analysis of a Conference Scheme Under Active and Passive Attacks
pp. 164
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
pp. 176
Analysis and Improvement of Micali’s Fair Contract Signing Protocol
pp. 188
Digital Signature Schemes with Domain Parameters
pp. 212
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
pp. 224
How to Re-use Round Function in Super-Pseudorandom Permutation
pp. 236
How to Remove MAC from DHIES
pp. 248
Symmetric Key Authentication Services Revisited
pp. 262
Improvements to the Point Halving Algorithm
pp. 289
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
pp. 301
A Mobile Agent System Providing Offer Privacy
pp. 313
Identity-Based Strong Designated Verifier Signature Schemes
pp. 336
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups
pp. 348
Convertible Nominative Signatures
pp. 358
Protocols with Security Proofs for Mobile Applications
pp. 370
Secure Bilinear Diffie-Hellman Bits
pp. 379
Weak Property of Malleability in NTRUSign
pp. 391
Information Security Risk Assessment, Aggregation, and Mitigation
pp. 402
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
pp. 414
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
pp. 427
Unconditionally Secure Encryption Under Strong Attacks
pp. 440
ManTiCore: Encryption with Joint Cipher-State Authentication
pp. 454
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
pp. 466
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
pp. 478
Fault Attacks on Signature Schemes
Similar content
1,808
Research on the Legal Protection of User Data Privacy in the Era of Artificial Intelligence.
Authors:
The mismeasurement of privacy: Using contextual integrity to reconsider privacy in HCI
Authors:
L. Barkhuus
PAPILLON: PrivAcy Preservation from Internet-based and Local Language MOdel ENsembles
Authors:
Li Siyan
,
Vethavikashini Chithrra Raghuram
,
Omar Khattab
…
See all similar
Cited by
2
Statistical Database Auditing Without Query Denial Threat
Authors:
Haibing Lu
,
Jaideep Vaidya
,
Vijayalakshmi Atluri
…
Development of Secure XML Data Warehouses with QVT
Authors:
E Marcos
,
C. Blanco
,
E. Fernández-Medina
…
See all cited by