Data Privacy Management and Autonomous Spontaneous Security
Editat de Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, William M. Fitzgeralden Limba Engleză Paperback – 2 apr 2014
Preț: 328.29 lei
Preț vechi: 410.37 lei
-20%
Puncte Express: 492
Carte tipărită la comandă
Livrare economică 01-15 iunie
Specificații
ISBN-13: 9783642545672
ISBN-10: 364254567X
Pagini: 420
Ilustrații: XVII, 400 p. 105 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.63 kg
Ediția:2014
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 364254567X
Pagini: 420
Ilustrații: XVII, 400 p. 105 illus.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.63 kg
Ediția:2014
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Quantifying and Measuring Anonymity.- Data Privacy Management Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones.- Practical Packing Method in Somewhat Homomorphic Encryption.- Collaborative and Privacy-Aware Sensing for Observing Urban Movement Patterns.- Parallel Implementation of GC-Based MPC Protocols in the Semi-Honest Setting.- Privacy Analysis of a Hidden Friendship Protocol.- Anonymous and Transferable Electronic Ticketing Scheme.- Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model.- Privacy-Preserving Processing of Raw Genomic Data.- Using Search Results to Microaggregate Query Logs Semantically.- Legal Issues About Metadata Data Privacy vs Information Security.- Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model.- Differentially Private Smart Metering with Battery Recharging.- AppGuard – Fine-Grained Policy Enforcement for Untrusted Android Applications.- Autonomous and Spontaneous Security Reference Monitors for Security and Interoperability in OAuth 2.0.- Remote Biometrics for Robust Persistent Authentication.- Classifying Android Malware through Subgraph Mining.- Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.- Advanced Detection Tool for PDF Threats.- Enforcing Input Validation through Aspect Oriented Programming.- Lightweight Cryptography for Embedded Systems – A Comparative Analysis.- A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching.- Dynamic Anonymous Index for Confidential Data.- Are On-Line Personae Really Un linkable.- On the Privacy of Private Browsing – A Forensic Approach.- Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes.