Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Ramakrishnan, S.
Dr.Mahalingam College Engg. and Technology, Pollachi
Coimbatore, India
   Reader Recommended
   Reviewer Selected
Follow this Reviewer
Date Reviewed  
- 10 of 30 reviews

  Reproducible circularly secure bit encryption: applications and realizations
Hajiabadi M., Kapron B.  Journal of Cryptology 30(4): 1187-1237, 2017. Type: Article

Homomorphic encryption permits processing information without actually decrypting it and is found useful in cloud-based applications. Circularly secure bit encryptions ensure the homomorphic property. This paper provides cryptographic primitives t...

Mar 22 2018  
   Cyberspace: risks and benefits for society, security and development
Ramírez J., García-Segura L.,  Springer International Publishing, New York, NY, 2017. 281 pp. Type: Book (978-3-319549-74-3)

Cyberspace is a part of daily life for businesses, government officials, and everyday people to some extent. It has made life fast, transparent, and simple at the expense of risks. Hence, experts working in cyberspace not only develop user applica...

Nov 28 2017  
   Algebra for cryptologists
Meijer A.,  Springer International Publishing, New York, NY, 2016. 301 pp. Type: Book (978-3-319303-95-6)

Cryptography is technically synonymous with information security. Providing security features for data and information is the most important concern in a business requirement. Most undergraduate students of electrical engineering and computer scie...

Mar 20 2017  
  Cyber-physical attack recovery procedures: a step-by-step preparation and response guide
Ayala L.,  Apress, New York, NY, 2016. 104 pp. Type: Book (978-1-484220-64-1)

Hackers and antisocial elements use cyber-attacks as powerful weapons. A typical cyber-attack damages computing and information systems and thus disturbs the organization heavily. A cyber-physical attack is a type of cyber-attack through which a h...

Oct 31 2016  
   Handbook of pattern recognition and computer vision
Chen C.,  World Scientific Publishing Co, Inc., River Edge, NJ, 2016. 560 pp. Type: Book, Reviews: (2 of 2)

Pattern recognition and computer vision are the most popular and powerful applications in modern computing industries. They have found wide ranges of applications such as biometrics, biomedical signal classification, industrial automation, and so ...

May 23 2016  
  Automated inference of past action instances in digital investigations
James J., Gladyshev P.  International Journal of Information Security 14(3): 249-261, 2015. Type: Article

The role of computers in forensics is expanding, since so much crime uses electronic devices. Developing support mechanisms for digital investigation is the need of the hour. However, a great number of lacunae exist in devising suitable digital in...

Apr 12 2016  
  A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
Gong L., Li S., Mao Q., Wang D., Dou J.  Theoretical Computer Science 609, Part 1, 253-261, 2016. Type: Article

Securing electronic information is one of the hottest research topics today. Encryption is the building block for various information security requirements such as confidentiality, authentication, integrity, and availability. Homomorphic encryptio...

Mar 16 2016  
   Fundamentals of machine learning for predictive data analytics: algorithms, worked examples, and case studies
Kelleher J., Mac Namee B., D’Arcy A.,  The MIT Press, Cambridge, MA, 2015. 624 pp. Type: Book (978-0-262029-44-5), Reviews: (3 of 4)

Predictive data analytics is an important task for an organization running a successful large-scale business today. With so much user data in electronic form within an organization, including user data from social media, predictive data analytics ...

Jan 27 2016  
   Protecting privacy in data release
Livraga G.,  Springer Publishing Company, Incorporated, New York, NY, 2015. 192 pp. Type: Book (978-3-319161-08-2)

With the expansion and acceptability of social media and online trading, securing data is important. Confidentiality, integrity, and availability are three pillars of information security [1]. Information and communication technologies are empower...

Oct 13 2015  
   Homomorphic encryption and applications
Yi X., Paulet R., Bertino E.,  Springer Publishing Company, Incorporated, New York, NY, 2014. 126 pp. Type: Book (978-3-319122-28-1), Reviews: (2 of 2)

Nowadays most information is exchanged in electronic form. This warrants several cryptographic functions such as confidentiality, integrity, authentication, and availability. In order to perform these functions, various cryptographic operations...

May 27 2015  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy