|
|
|
|
|
|
Date Reviewed |
|
|
1 - 6 of 6
reviews
|
|
|
|
|
|
|
|
Towards authentication using multi-modal online activities Gomi H., Yamaguchi S., Tsubouchi K., Sasaya N. UbiComp 2017 (Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, Maui, Hawaii, Sep 11-15, 2017) 37-40, 2017. Type: Proceedings
Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this is the first evaluation of ABA under ...
|
Oct 5 2017 |
|
|
|
|
|
|
Internet of Things (IoT): smart and secure service delivery Bertino E., Choo K., Georgakopolous D., Nepal S. ACM Transactions on Internet Technology 16(4): Article No. 22, 2016. Type: Article
The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are over 15 billion IoT devices in 2014, and this number is expected to grow exponentially in ...
|
Mar 31 2017 |
|
|
|
|
|
|
Towards a novel trust-based opportunistic routing protocol for wireless networks Salehi M., Boukerche A., Darehshoorzadeh A., Mammeri A. Wireless Networks 22(3): 927-943, 2016. Type: Article
Routing in an ad hoc wireless network is a very important topic, especially considering the presence of malicious nodes. The authors propose a novel trust-based opportunistic routing protocol. A simulation is implemented and three metr...
|
Jul 12 2016 |
|
|
|
|
|
|
Plus ça change, plus c’est la même chose Schou C. ACM Inroads 6(2): 64-69, 2015. Type: Article
History repeats itself. That is the premise of the paper. Since the 1960s, there has been a lot of discussion and standards/organizations/certificates/buzzwords on security, with a lot of duplicate work. The paper is very timely in thi...
|
Jul 21 2015 |
|
|
|
|
|
|
Online privacy: regional differences Kugler L. Communications of the ACM 58(2): 18-20, 2015. Type: Article
The topic of privacy is important. With the recent media coverage on data breaches and different privacy “standards” (for example, Google in Spain), this article is timely. It provides a brief rundown of why privacy...
|
Mar 10 2015 |
|
|
|
|
|
|
Summing up Landau S. Communications of the ACM 57(11): 37-39, 2014. Type: Article
The topic of privacy and security is an important aspect to consider in CACM’s Viewpoints column. The author provides a good summary of the topics covered by this particular column in the past six years. Several promin...
|
Nov 11 2014 |
|
|
|
|
|
|
|
|
|
|
|