Search
for Topics
All Reviews
Browse All Reviews
>
Information Systems (H)
>
Database Management (H.2)
>
General (H.2.0)
> Security, Integrity, And Protection (H.2.0...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 32 Reviews about "
Security, Integrity, And Protection (H.2.0...)
":
Date Reviewed
Internet of Things: information security challenges and solutions
Miloslavskaya N., Tolstoy A. Cluster Computing 22(1): 103-119, 2019. Type: Article
The Internet of Things (IoT) has gained tremendous popularity over the years, allowing objects to be connected without intervention from humans. While this has opened up many opportunities for developing services and applications, it h...
Jan 9 2020
2018: a big year for privacy
Landwehr C. Communications of the ACM 62(2): 20-22, 2019. Type: Article
Privacy and security issues reached high visibility in 2018, with many major publicized incidents. Carl Landwehr starts with the Facebook–Cambridge Analytica scandal, and then describes regulatory efforts such as the European Union (EU...
Nov 7 2019
Android platform-based individual privacy information protection system
Zhang W., Li X., Xiong N., Vasilakos A. Personal and Ubiquitous Computing 20(6): 875-884, 2016. Type: Article
I’m not impressed by this paper. On one hand, the remote short message service (SMS) command feature it describes sounds potentially useful. On the other hand, remote commands are not new and do not constitute a “pr...
Nov 7 2017
The psychology of information security
Zinatullin L., It Governance Ltd, Ely, UK, 2016. 128 pp. Type: Book (978-1-849287-89-0)
With the increase of ever-advancing technology, the field of information security has seemingly overlooked a crucial factor: humans. This book aims to address this lacuna by describing the role of human psychology with respect to secur...
Aug 15 2017
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios
Halevi T., Saxena N. International Journal of Information Security 14(5): 443-456, 2015. Type: Article
Side channel attacks are commonly associated with the observation of physical parameters of electronic systems to obtain useful information to breach system security. Typical parameters that can yield interesting results include timing...
Feb 17 2016
Protecting privacy in data release
Livraga G., Springer Publishing Company, Incorporated, New York, NY, 2015. 192 pp. Type: Book (978-3-319161-08-2)
With the expansion and acceptability of social media and online trading, securing data is important. Confidentiality, integrity, and availability are three pillars of information security [1]. Information and communication technologies...
Oct 13 2015
Advanced linear cryptanalysis of block and stream ciphers
Junod P., Canteaut A., IOS PRESS, Amsterdam, the Netherlands, 2011. 144 pp. Type: Book (978-1-607508-43-4)
Linear cryptanalysis started to attract broad interest from the worldwide cryptologic community in 1994, when Mitsuru Matsui presented a method to break the data encryption standard (DES) cipher through what can be substantively define...
Aug 1 2012
Dependencies revisited for improving data quality
Fan W. PODS 2008 (Proceedings of the 27th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Vancouver, Canada, Jun 9-12, 2008) 159-170, 2008. Type: Proceedings
Poor data quality, especially in relational databases--such as incorrectly priced products in retail databases--has proven to be very expensive. Helping to improve the quality of data through semi-automated software p...
Dec 10 2008
Digital multi-signature scheme based on the elliptic curve cryptosystem
Chen T., Huang K., Chung Y. Journal of Computer Science and Technology 19(4): 570-573, 2004. Type: Article
Chen, Huang, and Chung develop a multi-signature algorithm, based on an older paper by Popescu [1]....
Feb 1 2005
Computational Issues in Secure Interoperation
Gong L., Qian X. IEEE Transactions on Software Engineering 22(1): 43-52, 1996. Type: Article
We tend to design, build, and test automated systems one at a time. However, we tend to field them in interoperational clusters. This produces significant problems of adequate super-systems testing and, therefore, of adequate super-sys...
Jan 1 1997
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy