Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Chan-Tin, Eric
Oklahoma State University
Stillwater, Oklahoma
 
   Reviewer Selected
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 6 of 6 reviews

   
   Towards authentication using multi-modal online activities
Gomi H., Yamaguchi S., Tsubouchi K., Sasaya N.  UbiComp 2017 (Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, Maui, Hawaii,  Sep 11-15, 2017) 37-40, 2017. Type: Proceedings

Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this is the first evaluation of ABA under a large user...

Oct 5 2017  
   Internet of Things (IoT): smart and secure service delivery
Bertino E., Choo K., Georgakopolous D., Nepal S.  ACM Transactions on Internet Technology 16(4): Article No. 22, 2016. Type: Article

The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are over 15 billion IoT devices in 2014, and this number is expected to grow exponentially in the coming y...

Mar 31 2017  
  Towards a novel trust-based opportunistic routing protocol for wireless networks
Salehi M., Boukerche A., Darehshoorzadeh A., Mammeri A.  Wireless Networks 22(3): 927-943, 2016. Type: Article

Routing in an ad hoc wireless network is a very important topic, especially considering the presence of malicious nodes. The authors propose a novel trust-based opportunistic routing protocol. A simulation is implemented and three metrics (RTOR, T...

Jul 12 2016  
   Plus ça change, plus c’est la même chose
Schou C.  ACM Inroads 6(2): 64-69, 2015. Type: Article

History repeats itself. That is the premise of the paper. Since the 1960s, there has been a lot of discussion and standards/organizations/certificates/buzzwords on security, with a lot of duplicate work. The paper is very timely in this era of sec...

Jul 21 2015  
   Online privacy: regional differences
Kugler L.  Communications of the ACM 58(2): 18-20, 2015. Type: Article

The topic of privacy is important. With the recent media coverage on data breaches and different privacy “standards” (for example, Google in Spain), this article is timely. It provides a brief rundown of why privacy laws around the wor...

Mar 10 2015  
   Summing up
Landau S.  Communications of the ACM 57(11): 37-39, 2014. Type: Article

The topic of privacy and security is an important aspect to consider in CACM’s Viewpoints column. The author provides a good summary of the topics covered by this particular column in the past six years. Several prominent examples of ...

Nov 11 2014  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy