Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Gong, Zheng
South China Normal University
Guangzhou, China
 
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 10 of 19 reviews

   
   Information security planning: a practical approach (2nd ed.)
Lincke S., Springer International Publishing, Cham, Switzerland, 2024. 445 pp.  Type: Book (9783031431173)

Information security planning presents a comprehensive guide to the basics of information security planning. The author’s perspective addresses critical issues and challenges for emerging information security, including security aware...

Apr 3 2024  
   Security, privacy and user interaction
Jakobsson M., Springer International Publishing, New York, NY, 2020. 153 pp.  Type: Book (978-3-030437-53-4)

This book reviews pivotal application problems related to security and privacy by considering end user interactions. The editor uses his own experiences to explain how he converts “pure” cryptography to user awarene...

Aug 11 2021  
  Mitigating risks of digitalization through managed industrial security services
Jansen C., Jeschke S. AI & Society 33(2): 163-173, 2018.  Type: Article

This paper discusses the risks of industrial security services. Moreover, the authors consider future automation scenarios as well as the major concepts involved in industrial security services....

Oct 19 2018  
   Tutorials on the foundations of cryptography: dedicated to Oded Goldreich
Lindell Y., Springer International Publishing, New York, NY, 2017. 450 pp.  Type: Book (978-3-319570-47-1)

The foundations of cryptography [1], assembled from the lecture notes of Oded Goldreich, is widely known for its high value in cryptographic research. Just like its name, the book discusses many pivotal problems of cryptology in...

Jun 1 2018  
  Security challenges and approaches in Internet of Things
Misra S., Maheswaran M., Hashmi S., Springer International Publishing, New York, NY, 2016. 107 pp.  Type: Book (978-3-319442-29-7)

The Internet of Things (IoT) is a tremendously growing network that will affect our daily lives in every aspect. Therefore, the security of IoT needs to be carefully considered due to the size of the network. This book gives a well-org...

Mar 23 2017  
   Effective coding with VHDL: principles and best practice
Jasinski R., The MIT Press, Cambridge, MA, 2016. 624 pp.  Type: Book (978-0-262034-22-7)

VHSIC hardware description language (VHDL) is a fundamental language for circuit design. Most books on VHDL focus on language features, concurrency models, and signal update mechanisms: learning the basic coding techniques. How to impr...

Dec 7 2016  
  Spreading alerts quietly and the subgroup escape problem
Aspnes J., Diamadi Z., Yampolskiy A., Gjøsteen K., Peralta R. Journal of Cryptology 28(4): 796-819, 2015.  Type: Article

In intrusion detection, how to send alert messages without scaring the attacker in the very early state is a practical issue. The solutions for this problem vary. Sentinel nodes can send encrypted messages instead of plaintext, but for...

Feb 9 2016  
   Counterfeit integrated circuits: detection and avoidance
Tehranipoor M., Guin U., Forte D., Springer Publishing Company, Incorporated, Cham, Switzerland, 2015. 269 pp.  Type: Book (978-3-319118-23-9)

Counterfeit integrated circuits (ICs) are an emerging problem in the semiconductor industry due to their worldwide production and distribution. How to prevent the increasing threat of counterfeiting is a complex issue, because it relat...

Aug 13 2015  
   A unified method for finding impossible differentials of block cipher structures
Luo Y., Lai X., Wu Z., Gong G. Information Sciences 263211-220, 2014.  Type: Article

Impossible differential analysis is widely used as a cryptographic tool for key recovering or distinguishing attacks on block ciphers. There are mainly two methods for searching impossible differentials: one is case-by-case analysis an...

Nov 6 2014  
  Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness
Myers S., Sergi M., shelat a. Journal of Computer Security 21(5): 721-748, 2013.  Type: Article

Ways to construct cryptographic schemes to protect against malicious attackers have received a great deal of attention in the area of formally provable security, in both academia and industry. It is very difficult to define new formal ...

Oct 6 2014  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy