Search
for Author
All Reviews
Bertino, Elisa
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
18
reviews
Data transparency with blockchain and AI ethics
Bertino E., Kundu A., Sura Z. Journal of Data and Information Quality 11(4): 1-8, 2019. Type: Article
With the ever-growing use of digital technology, especially the use of big data technologies and machine learning, questions related to the proper use of data collected from social networks led to the introduction of data transparency....
...
Apr 14 2021
Cyber-physical security and privacy in the electric smart grid
McMillin B., Roth T., Bertino E., Morgan&Claypool Publishers, 2017. 66 pp. Type: Book (978-1-681731-03-2)
The book presents an interesting selection of papers within the domain of cyber-physical security. It provides a starting point for researchers trying to navigate security and privacy issues within a smart grid....
...
Jun 14 2019
Internet of Things (IoT): smart and secure service delivery
Bertino E., Choo K., Georgakopolous D., Nepal S. ACM Transactions on Internet Technology 16(4): Article No. 22, 2016. Type: Article
The coverage of the Internet of Things (IoT), especially on security, is critical. As the paper and other sources on the Internet say, there are over 15 billion IoT devices in 2014, and this number is expected to grow exponentially in ...
...
Mar 31 2017
Practical approximate
k
-nearest neighbor queries with location and query privacy
Yi X., Paulet R., Bertino E., Varadharajan V. IEEE Transactions on Knowledge and Data Engineering 28(6): 1546-1559, 2016. Type: Article
Location-based services (LBS) have been used as a Trojan horse to reveal users’ private data. Since they run on mobile applications, individuals can share real-time and historical location information online....
...
Sep 20 2016
Homomorphic encryption and applications
Yi X., Paulet R., Bertino E., Springer Publishing Company, Incorporated, New York, NY, 2014. 126 pp. Type: Book (978-3-319122-28-1), Reviews: (2 of 2)
Nowadays most information is exchanged in electronic form. This warrants several cryptographic functions such as confidentiality, integrity, authentication, and availability. In order to perform these functions, various cryptographic o...
...
May 27 2015
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy