Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > General (C.2.0) > Security and Protection (C.2.0...)  
  1-10 of 727 Reviews about "Security and Protection (C.2.0...)": Date Reviewed
  Towards privacy protection and malicious behavior traceability in smart health
Zhang Y., Li J., Zheng D., Chen X., Li H.  Personal and Ubiquitous Computing 21(5): 815-830, 2017. Type: Article

In this paper, the authors address privacy and malicious behavior for e-health, since they argue that it is particularly ideal for use in smart cities. The authors’ concern for users is privacy protection through cryptographic encryption. Th...

Mar 20 2018
  Computer and network security essentials
Francia G., Ertaul L., Encinas L., El-Sheikh E., Daimi K.,  Springer International Publishing, New York, NY, 2017. 618 pp. Type: Book (978-3-319584-23-2)

Computers and their networks are being widely used nowadays. Hence, their security is a very hot topic. This book on computer and network security essentials consists of 35 contributed chapters edited by a main editor and four associate editors. A...

Feb 28 2018
  Guide to computer network security (4th ed.)
Kizza J.,  Springer International Publishing, New York, NY, 2017. 569 pp. Type: Book (978-3-319556-05-5)

The fourth edition of this outstanding guide is fully revised, keeping in line with the latest technological developments of the computing ecosystem, which resulted from the removal of the logical boundaries between enterprise, mobile, wireless, a...

Dec 14 2017
  Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
Diro A., Chilamkurti N., Kumar N.  Mobile Networks and Applications 22(5): 848-858, 2017. Type: Article

Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest to readers who are fa...

Nov 29 2017
  Cyber security. Simply. Make it happen.: leveraging digitization through IT security
Abolhassan F.,  Springer International Publishing, New York, NY, 2017. 127 pp. Type: Book (978-3-319465-28-9)

The book is edited by Ferri Abolhassan, from Telekom Deutschland, who collected 11 chapters, each one from a different author. All chapters serve as the basis for a discussion on digitization and its impact on the future development of our society...

Nov 28 2017
  Security in high-performance computing environments
Peisert S.  Communications of the ACM 60(9): 72-80, 2017. Type: Article

Peisert starts with the question of whether there is any difference between high-performance computing and the traditional computational environment in terms of security. Apparently, there are no profound differences, aside from speed and volume, ...

Nov 28 2017
  Security-aware design for cyber-physical systems: a platform-based approach
Lin C., Sangiovanni-Vincentelli A.,  Springer International Publishing, New York, NY, 2017. 102 pp. Type: Book (978-3-319513-27-0)

Our daily life and the objects that surround us are becoming more and more intertwined in networks of computers and algorithms, in a manner so pervasive that often we fail to appreciate how much we depend on them and to what extent we end up becom...

Oct 13 2017
  Fog computing for the Internet of Things: security and privacy issues
Alrawais A., Alhothaily A., Hu C., Cheng X.  IEEE Internet Computing 21(2): 34-42, 2017. Type: Article

Connecting everything to the Internet is attractive because it can bring efficiency and convenience in many areas. However, security and privacy issues can also occur. The problem is that it is difficult to apply existing security and privacy solu...

Sep 7 2017
  Wireless sensor networks: security, coverage, and localization
Selmic R., Phoha V., Serwadda A.,  Springer International Publishing, New York, NY, 2016. 215 pp. Type: Book (978-3-319467-67-2)

With the emerging fields of Internet of Things (IoT) and wearable technologies, sensor networks have become an important concept. They have applications in many different domains, including healthcare, military, and home automation. The book is a ...

Aug 2 2017
  Ten laws for security
Diehl E.,  Springer International Publishing, New York, NY, 2016. 281 pp. Type: Book (978-3-319426-39-6)

In contrast to many security texts that are focused on interpreting the checklists included in one of the many published security standards (for example, ISO 27002:2005) to assess and improve an organization’s information security program, <...

Jun 19 2017
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy