Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Atanasiu, Adrian
University of Bucharest
Bucharest, Romania
 
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 74 reviews

   
   Quantum computing for computer scientists
Yanofsky N., Mannucci M., Cambridge University Press, New York, NY, 2008. 368 pp.  Type: Book (9780521879965)

Quantum computing is a new research field at the intersection of computer science (CS), mathematics, and physics. The book’s goal is to present--in a very clear way--some of the more popular topics in quantu...

Dec 2 2008  
   Introduction to identity-based encryption (Information Security and Privacy Series)
Martin L., Artech House, Inc., Norwood, MA, 2008. 232 pp.  Type: Book (9781596932388)

Identity-based encryption (IBE) is a public-key encryption technology that allows a user to calculate a public key from an arbitrary string. The original idea appears in a paper by Boneh and Franklin [1]. In fact, most of the protocols...

Oct 31 2008  
  Algorithmic results in list decoding
Guruswami V. Foundations and Trends in Theoretical Computer Science 2(2): 107-195, 2006.  Type: Article

Continuing the study of error detecting and correcting codes based on Guruswami’s list decoding [1], this paper’s idea is to obtain, as result of decoding, a small list of candidate messages that will, of course, in...

Sep 24 2008  
   Image retrieval: ideas, influences, and trends of the new age
Datta R., Joshi D., Li J., Wang J. ACM Computing Surveys 40(2): 1-60, 2008.  Type: Article

Content-based image retrieval (CBIR) refers to any technology that, in principle, helps to organize digital picture archives by their visual content. This paper presents a comprehensive survey that analyzes and quantifies almost 300 co...

Aug 7 2008  
   Cryptanalysis of ISO/IEC 9796-1
Coppersmith D., Coron J., Grieu F., Halevi S., Jutla C., Naccache D., Stern J. Journal of Cryptology 21(1): 27-51, 2008.  Type: Article

The ISO/IEC 9796-1 signature standard is the first international standard for digital signatures. This paper describes two different attacks against it. Each of the two attacks constitutes existential forgery under a chosen message att...

Jun 19 2008  
   Instant ciphertext-only cryptanalysis of GSM encrypted communication
Barkan E., Biham E., Keller N. Journal of Cryptology 21(3): 392-429, 2008.  Type: Article

Global system for mobile communications (GSM) and general packet radio service (GPRS) use encryption and security protocols to protect the privacy and integrity of the data they transmit. In this paper, new methods for attacking this e...

Jun 16 2008  
   Split-ballot voting: everlasting privacy with distributed trust
Moran T., Naor M.  Computer and communications security (Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia, Oct 28-31, 2007) 246-255, 2007.  Type: Proceedings

A universally verifiable voting protocol, which can be performed by unaided humans and distributed trust across more than one voting authority, is presented in this paper. It combines both physical and cryptographical requirements....

May 14 2008  
   A coercion-resistant Internet voting protocol
Meng B.  ICSNC 2007 (Proc. of the 2nd International Conference on Systems and Networks Communications,Aug 25-31, 2007) 672007.  Type: Proceedings

An Internet voting protocol (IVP) is defined as a voting procedure that uses a computer to cast a ballot over the Internet. There are four types of Internet voting: remote IVP, kiosk IVP, polling places IVP, and precinct IVP. This pape...

Apr 24 2008  
   Modular proofs for key exchange: rigorous optimizations in the Canetti–Krawczyk model
Hitchcock Y., Boyd C., González Nieto J. Applicable Algebra in Engineering, Communication and Computing 16(6): 405-438, 2006.  Type: Article

The Canetti-Krawczyk (CK) model enables an engineering approach to the provable security of protocols. This is done by separating the proofs of authentication mechanisms from the proofs of the protocols providing the basic required fun...

Nov 26 2007  
   Advances in signatures, encryption, and e-cash from bilinear groupsHohenberger S. Rivest R.2006 Type: Doctoral Thesis
This doctoral thesis, written by Susan Hohenberger and supervised by Ron Rivest, uses bilinear groups defined over rational points of an elliptic curve in order to introduce the concept of re-cryptography, which is based on the coopera...

Nov 20 2007  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy