Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Victor-Valeriu, Patriciu
Military Technical Academy
Bucharest, Romania
   Reviewer Selected
Follow this Reviewer
Date Reviewed  
- 7 of 7 reviews

  Secure encrypted steganography graphical password scheme for near field communication smartphone access control system
Cheong S., Ling H., Teh P.  Expert Systems with Applications: An International Journal 41(7): 3561-3568, 2014. Type: Article

A two-factor authentication near-field communication (NFC) smartphone access control system is proposed in this paper as an emerging alternative to traditional authentication schemes. The authors combine the usage of digital key cryptography with ...

Apr 23 2015  
   AppSec: a safe execution environment for security sensitive applications
Ren J., Qi Y., Dai Y., Wang X., Shi Y.  VEE 2015 (Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Istanbul, Turkey,  Mar 14-15, 2015) 187-199, 2015. Type: Proceedings

The authors of AppSec present a proposed implementation to achieve a secure environment without modifying the operating system (OS) kernel or applications. The main concept is that only the OS is untrusted, while the hardware and the firmware are ...

Apr 22 2015  
  How to keep a secret: leakage deterring public-key cryptosystems
Kiayias A., Tang Q.  CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany,  Nov 4-8, 2013) 943-954, 2013. Type: Proceedings

Any implementation of the cryptographic function leads to the recovery of some private information by some third-party entities. The paper tackles the problem of leakage deterring in public-key cryptosystems....

May 29 2014  
  A multidisciplinary introduction to information security
Mjølsnes S.,  Chapman & Hall/CRC, Boca Raton, FL, 2011. 348 pp. Type: Book (978-1-420085-90-7)

Nowadays, the study of information security involves being aware of a broad range of domains, including mathematics, computer science, telecommunications, and social sciences. Information security focuses on how the information processed in comput...

Apr 4 2012  
  eLearning and digital publishing (Computer Supported Cooperative Work)
Ching H., Poon P., McNaught C.,  Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 246 pp. Type: Book (9781402036408)

Today, university instruction needs to prepare graduates for a changing and globally connected world. This book explores the role of technology in this scenario, and offers fresh insights and new strategies for understanding the nature of scholarl...

Dec 11 2006  
  Cryptography and coding: 10th IMA International Conference, Cirencester, UK, December 2005, Proceedings (Lecture Notes in Computer Science 3796)
Smart N.,  Springer-Verlag New York, Inc., Secaucus, NJ, 2006. 461 pp. Type: Book (9783540302766)

From email to the global system for mobile communications (GSM), from secure Web access to online administration and government applications, cryptography is an essential part of today’s information systems. Cryptography provides confide...

Jul 13 2006  
  Cryptography in the database: the last line of defense
Kenan K.,  Addison-Wesley Professional, Boston, MA, 2005. 312 pp. Type: Book (9780321320735)

Databases serve as repositories for critical business and personal data. From an attacker’s perspective, attacking a database is much more lucrative than eavesdropping on network links. Privacy, and how companies store and protect sensitive ...

Jun 14 2006  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy