Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Data (E) > Data Encryption (E.3)  
 
Options:
 
  1-10 of 272 Reviews about "Data Encryption (E.3)": Date Reviewed
  Protecting privacy through homomorphic encryption
Lauter K., Dai W., Laine K., Springer, New York, NY, 2022. 176 pp.  Type: Book (9783030772871)

With the growing use of sensitive personal information, which also corresponds to the term “personally identifiable information (PII)” in information and communications technology (ICT) environments, the requirements for privacy protec...

Jun 2 2023
  Integrity-verifiable conjunctive keyword searchable encryption in cloud storage
Li Y., Zhou F., Qin Y., Lin M., Xu Z. International Journal of Information Security 17(5): 549-568, 2018.  Type: Article

Nowadays, data is becoming more and more confidential and sensitive, hence the growing need for encryption. But once data is encrypted, so are the keywords needed to search for it. So people are faced with the challenging task of searc...

Dec 14 2018
  Quantum computing: an environment for intelligent large scale real application
Hassanien A., Elhoseny M., Kacprzyk J., Springer International Publishing, New York, NY, 2018. 505 pp.  Type: Book (978-3-319636-38-2)

The book covers applications in quantum computing, along with some fundamental research. The application areas include cryptography, networking, image processing, optimization, and multi-user systems. The research work includes quantum...

Nov 26 2018
   Codes, cryptology and curves with computer algebra
Pellikaan R., Wu X., Bulygin S., Jurrius R., Cambridge University Press, New York, NY, 2018. 606 pp.  Type: Book (978-0-521520-36-2)

This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content),...

Sep 13 2018
  Tutorials on the foundations of cryptography: dedicated to Oded Goldreich
Lindell Y., Springer International Publishing, New York, NY, 2017. 450 pp.  Type: Book (978-3-319570-47-1)

The foundations of cryptography [1], assembled from the lecture notes of Oded Goldreich, is widely known for its high value in cryptographic research. Just like its name, the book discusses many pivotal problems of cryptology in...

Jun 1 2018
   Cracking codes with Python: an introduction to building and breaking ciphers
Sweigart A., No Starch Press, San Francisco, CA, 2018. 416 pp.  Type: Book (978-1-593278-22-9)

One of the many things I like about the Python programming language is that, once you learn basic Python programming, a whole host of other interesting ideas are within your grasp. I am one of those people who likes to learn things by ...

Jun 1 2018
   Mathematical modelling for next-generation cryptography: CREST Crypto-Math Project
Takagi T., Wakayama M., Tanaka K., Kunihiro N., Kimoto K., Duong D., Springer International Publishing, New York, NY, 2017. 368 pp.  Type: Book

Cryptography is the science of analyzing and deciphering codes and ciphers. Today, cryptography is widely used in many day-to-day applications. This book was produced as part of the CREST Crypto-Math Project funded by the Japan Science...

May 1 2018
  Proxy-assisted access control scheme of cloud data for smart cities
Fan K., Wang J., Wang X., Yang Y. Personal and Ubiquitous Computing 21(5): 937-947, 2017.  Type: Article

The rapid development of cloud and fog computing accompanied by the deployment of the Internet of Things (IoT) ensure big data collection from various sources, including humans, devices, and assets. The core of any smart city project i...

Apr 5 2018
  A generalized attack on RSA type cryptosystems
Bunder M., Nitaj A., Susilo W., Tonien J. Theoretical Computer Science 704 74-81, 2017.  Type: Article

The safety of the well-known RSA cryptosystem is based on the fact that, in general, it is computationally very hard to factorize large integers. Given two large prime numbers p and q, the public k...

Mar 23 2018
  Reproducible circularly secure bit encryption: applications and realizations
Hajiabadi M., Kapron B. Journal of Cryptology 30(4): 1187-1237, 2017.  Type: Article

Homomorphic encryption permits processing information without actually decrypting it and is found useful in cloud-based applications. Circularly secure bit encryptions ensure the homomorphic property. This paper provides cryptographic ...

Mar 22 2018
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy