Security and Privacy in Communication Networks

Security and Privacy in Communication Networks

Author: Bhavani Thuraisingham

Publisher: Springer

Published: 2016-01-23

Total Pages: 742

ISBN-13: 3319288652

DOWNLOAD EBOOK

This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015. The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015. The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web and network security; crypto, protocol, and model.


Data and Applications Security and Privacy XXX

Data and Applications Security and Privacy XXX

Author: Silvio Ranise

Publisher: Springer

Published: 2016-07-23

Total Pages: 365

ISBN-13: 3319414836

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 30th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2016, held in trento, Itlay, in July 2016. The 17 full papers and 7 short papers presented were carefully reviewed and selected from 54 submissions. Their topics cover a wide range of data and application security and privacy problems including those of mobile devices, collaborative systems, databases, big data, virtual systems, cloud computing, and social networks. The program also included twoinvited talks.


Handbook of Mobile Data Privacy

Handbook of Mobile Data Privacy

Author: Aris Gkoulalas-Divanis

Publisher: Springer

Published: 2018-10-26

Total Pages: 426

ISBN-13: 3319981617

DOWNLOAD EBOOK

This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.


Intrusion Detection and Prevention for Mobile Ecosystems

Intrusion Detection and Prevention for Mobile Ecosystems

Author: Georgios Kambourakis

Publisher: CRC Press

Published: 2017-09-06

Total Pages: 477

ISBN-13: 131530581X

DOWNLOAD EBOOK

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem. It also includes surveys, simulations, practical results and case studies.


Security, Privacy, and Anonymity in Computation, Communication, and Storage

Security, Privacy, and Anonymity in Computation, Communication, and Storage

Author: Guojun Wang

Publisher: Springer

Published: 2017-12-05

Total Pages: 629

ISBN-13: 3319723898

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.


Mobile Crowdsensing

Mobile Crowdsensing

Author: Cristian Borcea

Publisher: CRC Press

Published: 2016-12-01

Total Pages: 207

ISBN-13: 1315352419

DOWNLOAD EBOOK

Mobile crowdsensing is a technology that allows large scale, cost-effective sensing of the physical world. In mobile crowdsensing, mobile personal devices such as smart phones or smart watches come equipped with a variety of sensors that can be leveraged to collect data related to environment, transportation, healthcare, safety and so on. This book presents the first extensive coverage of mobile crowdsensing, with examples and insights drawn from the authors’ extensive research on this topic as well as from the research and development of a growing community of researchers and practitioners working in this emerging field. Throughout the text, the authors provide the reader with various examples of crowdsensing applications and the building blocks to creating the necessary infrastructure, explore the related concepts of mobile sensing and crowdsourcing, and examine security and privacy issues introduced by mobile crowdsensing platforms. Provides a comprehensive description of mobile crowdsensing, a one-stop shop for all relevant issues pertaining to mobile crowdsensing, including motivation, applications, design and implementation, incentive mechanisms, and reliability and privacy. Describes the design and implementations of mobile crowdsensing platforms of great interest for the readers working in research and industry to quickly implement and test their systems. Identifies potential issues in building such mobile crowdsensing applications to ensure their usability in real life and presents future directions in mobile crowdsensing by emphasizing the open problems that have to be addressed.


The Handbook of Ad Hoc Wireless Networks

The Handbook of Ad Hoc Wireless Networks

Author: Mohammad Ilyas

Publisher: CRC Press

Published: 2017-12-19

Total Pages: 975

ISBN-13: 1351836153

DOWNLOAD EBOOK

A relative newcomer to the field of wireless communications, ad hoc networking is growing quickly, both in its importance and its applications. With rapid advances in hardware, software, and protocols, ad hoc networks are now coming of age, and the time has come to bring together into one reference their principles, technologies, and techniques. The Handbook of Ad Hoc Wireless Networks does exactly that. Experts from around the world have joined forces to create the definitive reference for the field. From the basic concepts, techniques, systems, and protocols of wireless communication to the particulars of ad hoc network routing methods, power, connections, traffic management, and security, this handbook covers virtually every aspect of ad hoc wireless networking. It includes a section that explores several routing methods and protocols directly related to implementing ad hoc networks in a variety of applications. The benefits of ad hoc wireless networks are many, but several challenges remain. Organized for easy reference, The Handbook of Ad Hoc Wireless Networks is your opportunity to gain quick familiarity with the state of the art, have at your disposal the only complete reference on the subject available, and prepare to meet the technological and implementation challenges you'll encounter in practice.


Passive and Active Measurement

Passive and Active Measurement

Author: Oliver Hohlfeld

Publisher: Springer Nature

Published: 2021-03-29

Total Pages: 582

ISBN-13: 3030725820

DOWNLOAD EBOOK

This book constitutes the proceedings of the 22nd Conference on Passive and Active Measurement, PAM 2021, which was planned to be held in Cottbus, Germany, in March 2021. Due to the Corona pandemic, the conference was organized as a virtual meeting. The 33 full papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections named: COVID-19; web security; video streaming; TLS; staying connected; DoS; performance; network security; DNS; capacity; and exposing hidden behaviors. Due to the Corona pandemic, PAM 2021 was held as a virtual conference.


A Beginner’s Guide to Internet of Things Security

A Beginner’s Guide to Internet of Things Security

Author: Brij B. Gupta

Publisher: CRC Press

Published: 2020-01-23

Total Pages: 113

ISBN-13: 1000037983

DOWNLOAD EBOOK

A Beginner’s Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.


Wireless Algorithms, Systems, and Applications

Wireless Algorithms, Systems, and Applications

Author: Edoardo S. Biagioni

Publisher: Springer

Published: 2019-06-20

Total Pages: 661

ISBN-13: 3030235971

DOWNLOAD EBOOK

This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks.