|
|
|
|
Gong, Zheng
South China Normal University
Guangzhou, China
|
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 19
reviews
|
|
|
|
|
|
|
|
Information security planning: a practical approach (2nd ed.) Lincke S., Springer International Publishing, Cham, Switzerland, 2024. 445 pp. Type: Book (9783031431173) Information security planning presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security aware...
|
Apr 3 2024 |
|
|
|
|
|
|
Security, privacy and user interaction Jakobsson M., Springer International Publishing, New York, NY, 2020. 153 pp. Type: Book (978-3-030437-53-4)
This book reviews pivotal application problems related to security and privacy by considering end user interactions. The editor uses his own experiences to explain how he converts “pure” cryptography to user awarene...
|
Aug 11 2021 |
|
|
|
|
|
|
Mitigating risks of digitalization through managed industrial security services Jansen C., Jeschke S. AI & Society 33(2): 163-173, 2018. Type: Article
This paper discusses the risks of industrial security services. Moreover, the authors consider future automation scenarios as well as the major concepts involved in industrial security services....
|
Oct 19 2018 |
|
|
|
|
|
|
Tutorials on the foundations of cryptography: dedicated to Oded Goldreich Lindell Y., Springer International Publishing, New York, NY, 2017. 450 pp. Type: Book (978-3-319570-47-1)
The foundations of cryptography [1], assembled from the lecture notes of Oded Goldreich, is widely known for its high value in cryptographic research. Just like its name, the book discusses many pivotal problems of cryptology in...
|
Jun 1 2018 |
|
|
|
|
|
|
Security challenges and approaches in Internet of Things Misra S., Maheswaran M., Hashmi S., Springer International Publishing, New York, NY, 2016. 107 pp. Type: Book (978-3-319442-29-7)
The Internet of Things (IoT) is a tremendously growing network that will affect our daily lives in every aspect. Therefore, the security of IoT needs to be carefully considered due to the size of the network. This book gives a well-org...
|
Mar 23 2017 |
|
|
|
|
|
|
Effective coding with VHDL: principles and best practice Jasinski R., The MIT Press, Cambridge, MA, 2016. 624 pp. Type: Book (978-0-262034-22-7)
VHSIC hardware description language (VHDL) is a fundamental language for circuit design. Most books on VHDL focus on language features, concurrency models, and signal update mechanisms: learning the basic coding techniques. How to impr...
|
Dec 7 2016 |
|
|
|
|
|
|
Spreading alerts quietly and the subgroup escape problem Aspnes J., Diamadi Z., Yampolskiy A., Gjøsteen K., Peralta R. Journal of Cryptology 28(4): 796-819, 2015. Type: Article
In intrusion detection, how to send alert messages without scaring the attacker in the very early state is a practical issue. The solutions for this problem vary. Sentinel nodes can send encrypted messages instead of plaintext, but for...
|
Feb 9 2016 |
|
|
|
|
|
|
Counterfeit integrated circuits: detection and avoidance Tehranipoor M., Guin U., Forte D., Springer Publishing Company, Incorporated, Cham, Switzerland, 2015. 269 pp. Type: Book (978-3-319118-23-9)
Counterfeit integrated circuits (ICs) are an emerging problem in the semiconductor industry due to their worldwide production and distribution. How to prevent the increasing threat of counterfeiting is a complex issue, because it relat...
|
Aug 13 2015 |
|
|
|
|
|
|
A unified method for finding impossible differentials of block cipher structures Luo Y., Lai X., Wu Z., Gong G. Information Sciences 263211-220, 2014. Type: Article
Impossible differential analysis is widely used as a cryptographic tool for key recovering or distinguishing attacks on block ciphers. There are mainly two methods for searching impossible differentials: one is case-by-case analysis an...
|
Nov 6 2014 |
|
|
|
|
|
|
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness Myers S., Sergi M., shelat a. Journal of Computer Security 21(5): 721-748, 2013. Type: Article
Ways to construct cryptographic schemes to protect against malicious attackers have received a great deal of attention in the area of formally provable security, in both academia and industry. It is very difficult to define new formal ...
|
Oct 6 2014 |
|
|
|
|
|
|
|
|
|
|
|