Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Wang, Hao
Microsoft Corp.
Redmond, Washington
  Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 18 reviews

   
  Understanding cryptography: a textbook for students and practitioners
Paar C., Pelzl J., Springer Publishing Company, Incorporated, New York, NY, 2009. 372 pp.  Type: Book (978-3-642041-00-6)

Although cryptography has a long history--it is believed that the oldest known text to contain one of the essential components of cryptography occurred some 4,000 years ago in Egypt--the era of modern cryptography rea...

May 6 2010  
  Analyzing space/capacity tradeoffs of cooperative wireless networks using a probabilistic model of interference
Lichte H., Valentin S., Karl H., Aad I., Widmer J.  MSWiM 2009 (Proceedings of the 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Tenerife, Canary Islands, Spain, Oct 26-29, 2009) 54-62, 2009.  Type: Proceedings

Using relays--which consume hardware space--“in wireless networks can potentially lead to significant capacity increases. However, within an asynchronous multi-user communication setting, relaying might caus...

Feb 4 2010  
  A secure unidirectional proxy re-encryption using identity and secret key exchange
Milgo E.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, South Carolina, Mar 19-21, 2009) 1-5, 2009.  Type: Proceedings

In 1998, Blaze, Bleumer, and Strauss [1] proposed the concept of proxy re-cryptography (PRC), including proxy re-encryption (PRE) and proxy re-signature (PRS). A PRE scheme is a cryptosystem that allows a third party (proxy) to transfo...

Sep 23 2009  
  Limit theorems for queueing systems with doubly stochastic poisson arrivals (heavy traffic conditions)
Afanas’eva L., Bashtova E. Problems of Information Transmission 44(4): 352-369, 2008.  Type: Article

Queueing theory, generally considered a branch of operations research, is applicable in a wide variety of situations encountered in commerce, business, industry, public service, and engineering....

Jun 9 2009  
  Applied algebra: codes, ciphers and discrete algorithms
Hardy D., Richman F., Walker C., Chapman & Hall/CRC, Boca Raton, FL, 2009. 424 pp.  Type: Book (9781420071429), Reviews: (1 of 2)

This revised and updated second edition is a comprehensive textbook that expands mathematical coverage of finite fields, number theory, cryptography, and error-control/correcting codes. However, instead of providing a general mathemati...

May 5 2009  
  Primality testing and integer factorization in public-key cryptography
Yan S., Springer Publishing Company, Incorporated, 2008. 374 pp.  Type: Book (9780387772677)

Primality testing and integer factorization, two of the most important and fundamental research fields in computational number theory, are related problems. However, they are quite different algorithmically. The Agrawal-Kay...

Apr 23 2009  
  Certificate-based fair exchange protocol of signatures from pairings
Shao Z. Computer Networks 52(16): 3075-3084, 2008.  Type: Article

Many business transactions over the Internet involve the exchange of digital items between two parties; these items include emails, electronic contracts, and digital signatures. In order to facilitate such transactions, a noninteractiv...

Apr 17 2009  
  On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
Paul G., Rathi S., Maitra S. Designs, Codes and Cryptography 49(1-3): 123-134, 2008.  Type: Article

RC4, developed by Ron Rivest in 1987, is a widely used stream cipher in commercial software applications. Since no linear feedback shift registers (LFSRs) are used to implement RC4, it is ideal for software implementation. To produce a...

Feb 12 2009  
  A password-based grid security infrastructure
Cai Z.  Digital society (Proceedings of the Second International Conference on Digital Society,Feb 10-15, 2008) 157-164, 2008.  Type: Proceedings

The open-source Globus Toolkit (GT) is used to build distributed computing systems and applications. In order to establish the identity of users and protect communications, the GT provides authentication and authorization based on the ...

Sep 9 2008  
  The six unsolved ciphers: inside the mysterious codes that have confounded the world’s greatest cryptographers
Belfield R., Ulysses Press, 2007. 312 pp.  Type: Book (9781569756287)

Because people love secrets, secret codes have forever excited the imagination of children and adults alike. From the earliest known use of cryptography in Egypt’s Old Kingdom to modern public-key cryptography, there are many...

Jun 10 2008  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy