Search
for Topics
All Reviews
Browse All Reviews
>
Software (D)
>
Operating Systems (D.4)
>
Security and Protection (D.4.6)
> Cryptographic Controls (D.4.6...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 28 Reviews about "
Cryptographic Controls (D.4.6...)
":
Date Reviewed
On architecting fully homomorphic encryption-based computing systems
Agrawal R., Joshi A., Springer International Publishing, Cham, Switzerland, 2023. 87 pp. Type: Book (303131753X)
This book must be considered a game changer in the field of data security and privacy. It is a true testament to the boundless potential of technology when put in the hands of brilliant minds....
Oct 16 2023
The long road ahead to transition to post-quantum cryptography
LaMacchia B., LaMacchia B. Communications of the ACM 65(1): 28-30, 2021. Type: Article
In this article, the author asserts the following:...
Jul 14 2022
Secure and effective implementation of an IOTA light node using STM32
Stucchi D., Susella R., Fragneto P., Rossi B. BlockSys 2019 (Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, New York, NY, Nov 10, 2019) 28-29, 2019. Type: Proceedings
Sensor systems and Internet of Things (IoT) environments raise a new major challenge to security. Some of these issues can be solved with blockchain protocols, for example, distributed ledger technologies (DLTs); however, “it...
Mar 15 2021
Foundations of information security: a straightforward introduction
Andress J., No Starch Press, San Francisco, CA, 2019. 248 pp. Type: Book (978-1-718500-04-4)
Like the subtitle suggests, this book is a gentle introduction to the subject of information security. It doesn’t assume any special background from the reader other than an understanding of the basic concepts of information ...
Feb 2 2021
Cybercryptography: applicable cryptography for cyberspace security
Yan S., Springer International Publishing, New York, NY, 2019. 436 pp. Type: Book (978-3-319725-34-5), Reviews: (2 of 2)
Cybersecurity is a major challenge today, as computing systems and networks play an increasingly important role in modern society. Cryptography addresses this problem based on mathematical theory, trying to ensure secure communication ...
Aug 24 2020
Lai-Massey cipher designs: history, design criteria and cryptanalysis
Nakahara J., Springer International Publishing, New York, NY, 2018. 726 pp. Type: Book (978-3-319682-72-3)
Ciphers, which are widely used for encrypting communication, are often classified as either stream ciphers or block ciphers. A stream cipher is defined as “a symmetric cipher that operates with a time-varying transformation o...
Jan 13 2020
Cryptographic and information security approaches for images and videos
Ramakrishnan S., CRC Press, Inc., Boca Raton, FL, 2019. 986 pp. Type: Book (978-1-138563-84-1)
Cryptography is the art of securing communications transmitted through insecure channels. It consists of mechanisms to keep the data confidential by preventing access to unapproved individuals, maintaining the integrity of the data thr...
Nov 26 2019
Decrypting the encryption debate: a framework for decision makers
National Academies of Sciences ., NATIONAL ACADEMY PRESS, Washington, DC, 2018. 118 pp. Type: Book (978-0-309471-53-4)
Both business and government organizations routinely protect information by encrypting data. Encryption is also used to protect information from the prying eyes of competitors and foreign governments, becoming an important and indispen...
Nov 22 2019
Cybercryptography: applicable cryptography for cyberspace security
Yan S., Springer International Publishing, New York, NY, 2019. 436 pp. Type: Book (978-3-319725-34-5), Reviews: (1 of 2)
In the last 40 years, “cyberspace” has become a common buzzword. Cyberspace has tremendous potential for human development in many sectors. The security of cyberspace is of utmost importance and poses a great challe...
May 3 2019
Adaptive cryptographic access control
Kayem A., Akl S., Martin P., Springer Publishing Company, Incorporated, New York, NY, 2010. 138 pp. Type: Book (978-1-441966-54-4)
Data encryption--the main technique used to control access to data--is the subject of this book. Two assumptions underlie the presented algorithms: users are divided into groups (hierarchies) based on the portion of t...
Feb 10 2012
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy