Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Baig, Zubair
ECU
Joondalup , Australia
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 17 reviews

   
  Secret-sharing schemes for very dense graphs
Beimel A., Farràs O., Mintz Y. Journal of Cryptology 29(2): 336-362, 2016.  Type: Article

Secret-sharing schemes are common when it comes to distributing a secret among individual participants so as to ascertain that no individual has full knowledge of the secret at any given time. The paper presents an approach for maintai...

Sep 14 2016  
  Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
Hoang T., Choi D., Nguyen T. International Journal of Information Security 14(6): 549-560, 2015.  Type: Article

Gait-based user authentication is a very well-known technique with ready adoption due to its nonobstructive method of operation. In this paper, Hoang et al. have proposed an inertial sensor-based approach for detecting human gait throu...

May 26 2016  
   Advanced Android application development
Annuzzi J., Darcey L., Conder S., Addison-Wesley Professional, Upper Saddle River, NJ, 2014. 624 pp.  Type: Book (978-0-133892-38-3)

Though the book is titled Advanced Android application development, it can be referred to by nonprogrammers wishing to implement advanced concepts for Android application design and development based on their individual requirem...

Apr 14 2016  
  Spiking deep convolutional neural networks for energy-efficient object recognition
Cao Y., Chen Y., Khosla D. International Journal of Computer Vision 113(1): 54-66, 2015.  Type: Article

A novel mechanism for converting convolutional neural networks (CNNs) to spiking neural networks (SNNs) to facilitate ready deployment, that is, mapping on spiking hardware architectures, is proposed in this paper....

Sep 28 2015  
   Symmetric cryptographic protocols
Ramkumar M., Springer Publishing Company, Incorporated, New York, NY, 2014. 234 pp.  Type: Book (978-3-319075-83-9)

Experienced security practitioners and cryptography researchers will benefit from reading this book. The author accurately states in the preface: “Lack of widespread appreciation of the scope of symmetric cryptography has led...

Feb 24 2015  
   Simple steps to data encryption: a practical guide to secure computing
Loshin P., Syngress Publishing, Waltham, MA, 2013. 86 pp.  Type: Book (978-0-124114-83-8)

Protecting information from unwanted disclosure and modification is of utmost importance in contemporary times. This book provides a step-by-step guide to data encryption and digital signatures using Gnu Privacy Guard (GnuPG) encryptio...

Jan 23 2014  
  A survey on ear biometrics
Abaza A., Ross A., Hebert C., Harrison M., Nixon M. ACM Computing Surveys 45(2): 1-35, 2013.  Type: Article

Recognizing human subjects by their ears has been a field of great interest for a long time. It has gained serious attention in the recent past due to technological advances. Although several surveys on ear biometrics exist in the lite...

Jun 19 2013  
  Rotation-invariant similarity in time series using bag-of-patterns representation
Lin J., Khade R., Li Y. Journal of Intelligent Information Systems 39(2): 287-315, 2012.  Type: Article

Through their proposed scheme, the authors of this paper drift away from the common practice of using shape-based measures for performing similarity checks in signal representations of data. A scheme based on the bag-of-words represent...

Feb 7 2013  
  Modular neural networks and type-2 fuzzy systems for pattern recognition
Melin P., Springer Publishing Company, Incorporated, New York, NY, 2011. 224 pp.  Type: Book (978-3-642241-38-3)

Melin provides a detailed description of a set of techniques based on both type-1 and type-2 fuzzy inference systems, with the focus application of single and multi-mode biometric authentication....

Nov 12 2012  
  CGrAnt: a swarm intelligence-based routing protocol for delay tolerant networks
Vendramin A., Munaretto A., Delgado M., Viana A.  GECCO 2012 (Proceedings of the 14th International Conference on Genetic and Evolutionary Computation, Philadelphia, PA, Jul 7-11, 2012) 33-40, 2012.  Type: Proceedings

All delay-tolerant networks (DTNs) suffer from a shortcoming: they are unable to sustain continuous connectivity between neighboring nodes. The problem of successful message forwarding in such networks is analogous to obtaining multipl...

Oct 29 2012  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy