|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 17
reviews
|
|
|
|
|
|
|
|
Secret-sharing schemes for very dense graphs Beimel A., Farràs O., Mintz Y. Journal of Cryptology 29(2): 336-362, 2016. Type: Article
Secret-sharing schemes are common when it comes to distributing a secret among individual participants so as to ascertain that no individual has full knowledge of the secret at any given time. The paper presents an approach for maintai...
|
Sep 14 2016 |
|
|
|
|
|
|
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme Hoang T., Choi D., Nguyen T. International Journal of Information Security 14(6): 549-560, 2015. Type: Article
Gait-based user authentication is a very well-known technique with ready adoption due to its nonobstructive method of operation. In this paper, Hoang et al. have proposed an inertial sensor-based approach for detecting human gait throu...
|
May 26 2016 |
|
|
|
|
|
|
Advanced Android application development Annuzzi J., Darcey L., Conder S., Addison-Wesley Professional, Upper Saddle River, NJ, 2014. 624 pp. Type: Book (978-0-133892-38-3)
Though the book is titled Advanced Android application development, it can be referred to by nonprogrammers wishing to implement advanced concepts for Android application design and development based on their individual requirem...
|
Apr 14 2016 |
|
|
|
|
|
|
Spiking deep convolutional neural networks for energy-efficient object recognition Cao Y., Chen Y., Khosla D. International Journal of Computer Vision 113(1): 54-66, 2015. Type: Article
A novel mechanism for converting convolutional neural networks (CNNs) to spiking neural networks (SNNs) to facilitate ready deployment, that is, mapping on spiking hardware architectures, is proposed in this paper....
|
Sep 28 2015 |
|
|
|
|
|
|
Symmetric cryptographic protocols Ramkumar M., Springer Publishing Company, Incorporated, New York, NY, 2014. 234 pp. Type: Book (978-3-319075-83-9)
Experienced security practitioners and cryptography researchers will benefit from reading this book. The author accurately states in the preface: “Lack of widespread appreciation of the scope of symmetric cryptography has led...
|
Feb 24 2015 |
|
|
|
|
|
|
Simple steps to data encryption: a practical guide to secure computing Loshin P., Syngress Publishing, Waltham, MA, 2013. 86 pp. Type: Book (978-0-124114-83-8)
Protecting information from unwanted disclosure and modification is of utmost importance in contemporary times. This book provides a step-by-step guide to data encryption and digital signatures using Gnu Privacy Guard (GnuPG) encryptio...
|
Jan 23 2014 |
|
|
|
|
|
|
A survey on ear biometrics Abaza A., Ross A., Hebert C., Harrison M., Nixon M. ACM Computing Surveys 45(2): 1-35, 2013. Type: Article
Recognizing human subjects by their ears has been a field of great interest for a long time. It has gained serious attention in the recent past due to technological advances. Although several surveys on ear biometrics exist in the lite...
|
Jun 19 2013 |
|
|
|
|
|
|
Rotation-invariant similarity in time series using bag-of-patterns representation Lin J., Khade R., Li Y. Journal of Intelligent Information Systems 39(2): 287-315, 2012. Type: Article
Through their proposed scheme, the authors of this paper drift away from the common practice of using shape-based measures for performing similarity checks in signal representations of data. A scheme based on the bag-of-words represent...
|
Feb 7 2013 |
|
|
|
|
|
|
Modular neural networks and type-2 fuzzy systems for pattern recognition Melin P., Springer Publishing Company, Incorporated, New York, NY, 2011. 224 pp. Type: Book (978-3-642241-38-3)
Melin provides a detailed description of a set of techniques based on both type-1 and type-2 fuzzy inference systems, with the focus application of single and multi-mode biometric authentication....
|
Nov 12 2012 |
|
|
|
|
|
|
CGrAnt: a swarm intelligence-based routing protocol for delay tolerant networks Vendramin A., Munaretto A., Delgado M., Viana A. GECCO 2012 (Proceedings of the 14th International Conference on Genetic and Evolutionary Computation, Philadelphia, PA, Jul 7-11, 2012) 33-40, 2012. Type: Proceedings
All delay-tolerant networks (DTNs) suffer from a shortcoming: they are unable to sustain continuous connectivity between neighboring nodes. The problem of successful message forwarding in such networks is analogous to obtaining multipl...
|
Oct 29 2012 |
|
|
|
|
|
|
|
|
|
|
|