|
|
|
|
|
|
Date Reviewed |
|
|
1 - 7 of 7
reviews
|
|
|
|
|
|
|
|
Secure encrypted steganography graphical password scheme for near field communication smartphone access control system Cheong S., Ling H., Teh P. Expert Systems with Applications: An International Journal 41(7): 3561-3568, 2014. Type: Article
A two-factor authentication near-field communication (NFC) smartphone access control system is proposed in this paper as an emerging alternative to traditional authentication schemes. The authors combine the usage of digital key crypto...
|
Apr 23 2015 |
|
|
|
|
|
|
AppSec: a safe execution environment for security sensitive applications Ren J., Qi Y., Dai Y., Wang X., Shi Y. VEE 2015 (Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, Istanbul, Turkey, Mar 14-15, 2015) 187-199, 2015. Type: Proceedings
The authors of AppSec present a proposed implementation to achieve a secure environment without modifying the operating system (OS) kernel or applications. The main concept is that only the OS is untrusted, while the hardware and the f...
|
Apr 22 2015 |
|
|
|
|
|
|
How to keep a secret: leakage deterring public-key cryptosystems Kiayias A., Tang Q. CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, Nov 4-8, 2013) 943-954, 2013. Type: Proceedings
Any implementation of the cryptographic function leads to the recovery of some private information by some third-party entities. The paper tackles the problem of leakage deterring in public-key cryptosystems....
|
May 29 2014 |
|
|
|
|
|
|
A multidisciplinary introduction to information security Mjølsnes S., Chapman & Hall/CRC, Boca Raton, FL, 2011. 348 pp. Type: Book (978-1-420085-90-7)
Nowadays, the study of information security involves being aware of a broad range of domains, including mathematics, computer science, telecommunications, and social sciences. Information security focuses on how the information process...
|
Apr 4 2012 |
|
|
|
|
|
|
eLearning and digital publishing (Computer Supported Cooperative Work) Ching H., Poon P., McNaught C., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 246 pp. Type: Book (9781402036408)
Today, university instruction needs to prepare graduates for a changing and globally connected world. This book explores the role of technology in this scenario, and offers fresh insights and new strategies for understanding the nature...
|
Dec 11 2006 |
|
|
|
|
|
|
Cryptography and coding: 10th IMA International Conference, Cirencester, UK, December 2005, Proceedings (Lecture Notes in Computer Science 3796) Smart N., Springer-Verlag New York, Inc., Secaucus, NJ, 2006. 461 pp. Type: Book (9783540302766)
From email to the global system for mobile communications (GSM), from secure Web access to online administration and government applications, cryptography is an essential part of today’s information systems. Cryptography ...
|
Jul 13 2006 |
|
|
|
|
|
|
Cryptography in the database: the last line of defense Kenan K., Addison-Wesley Professional, Boston, MA, 2005. 312 pp. Type: Book (9780321320735)
Databases serve as repositories for critical business and personal data. From an attacker’s perspective, attacking a database is much more lucrative than eavesdropping on network links. Privacy, and how companies store and pr...
|
Jun 14 2006 |
|
|
|
|
|
|
|
|
|
|
|