Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6)
 
  Security and Protection (D.4.6) See Reviews  
 
Subject Descriptors:
Access Controls (125)
Authentication (52)
Cryptographic Controls (97)
Information Flow Controls (29)
Invasive Software (33)
Security Kernels (6)
Verification (11)
 
Proper Nouns:
Xenix (1)
 
 
Reviews limited to:
 
 

Reviews about "Security and Protection (D.4.6)":
The long road ahead to transition to post-quantum cryptography
LaMacchia B. Communications of the ACM 65(1): 28-30, 2022.  Type: Article
Securing 5G and evolving architectures
Nair P., Addison-Wesley Professional, Boston, MA, 2021. 624 pp.  Type: Book (978-0-137457-93-9)
Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J., Springer, Switzerland, 2021. 283 pp.  Type: Book (978-3-030105-90-7), Reviews: (2 of 2)
Security of ubiquitous computing systems
Avoine G., Hernandez-Castro J., Springer, Switzerland, 2021. 283 pp.  Type: Book (978-3-030105-90-7), Reviews: (1 of 2)
Cybersecurity in digital transformations: scope and applications
Moller D., Springer, Switzerland, 2020. 133 pp.  Type: Book (978-3-030605-69-8)
Security, privacy and user interaction
Jakobsson M., Springer International Publishing, New York, NY, 2020. 153 pp.  Type: Book (978-3-030437-53-4)
Secure and effective implementation of an IOTA light node using STM32
Stucchi D., Susella R., Fragneto P., Rossi B.  BlockSys 2019 (Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, New York, NY, Nov 10, 2019) 28-29, 2019.  Type: Proceedings
more...
Related Topics
D.4.6 Security and Protection
  - Security and Protection
   
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2023 ThinkLoud®
Terms of Use
| Privacy Policy