Browse Results

Showing 71,801 through 71,825 of 85,187 results

Security and Privacy in Communication Networks: 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #164)

by Bhavani Thuraisingham XiaoFeng Wang Vinod Yegneswaran

This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015.The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015. The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web and network security; crypto, protocol, and model.

Security and Privacy in Communication Networks: 9th International ICST Conference, SecureComm 2013, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #127)

by Tanveer Zia Albert Zomaya Vijay Varadharajan Morley Mao

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications (Wiley - IEEE)

by Houbing Song Glenn A. Fink Sabina Jeschke

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today’s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.

Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications (Wiley - IEEE)

by Houbing Song Sabina Jeschke Glenn A. Fink

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today’s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.

Security and Privacy in Cyber-Physical Systems and Smart Vehicles: First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #552)

by Yu Chen Chung-Wei Lin Bo Chen Qi Zhu

This book constitutes the refereed proceedings of the First EAI International Conference, SmartSP 2023, held in Chicago, USA, during October 12-13, 2023. The 11 revised full papers were carefully reviewed and selected from 24 submissions. The papers focus on all details all technological aspects that are relevant to Security and privacy in cyber-physical systems.

Security and Privacy in Cyberspace (Blockchain Technologies)

by Omprakash Kaiwartya Keshav Kaushik Sachin Kumar Gupta Ashutosh Mishra Manoj Kumar

This book highlights the literature and the practical aspects to understand cybersecurity and privacy in various networks and communication devices. It provides details of emerging technologies on various networks by protecting the privacy and security of cyberspace. This book presents state-of-the-art advances in the field of cryptography and network security, cybersecurity and privacy, providing a good reference for professionals and researchers.

Security and Privacy in Digital Economy: First International Conference, SPDE 2020, Quzhou, China, October 30 – November 1, 2020, Proceedings (Communications in Computer and Information Science #1268)

by Shui Yu Peter Mueller Jiangbo Qian

This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*.The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: ​cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science.*The conference was held virtually due to the COVID-19 pandemic.

Security and Privacy in Digital Rights Management: ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001. Revised Papers (Lecture Notes in Computer Science #2320)

by Tomas Sander

The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on Computer and Communications Security (CCS-8) in Philadelphia, USA on November 5, 2001. Digital Rights Management technology is meant to provide end-to-end so- tions for the digital distribution of electronic goods. Sound security and privacy features are among the key requirements for such systems. Fifty papers were submitted to the workshop, quite a success for a ?rst-time workshop. From these 50 submissions, the program committee selected 15 papers for presentation at the workshop. They cover a broad area of relevant techniques, including cryptography, system architecture, and cryptanalysis of existing DRM systems. Three accepted papers are about software tamper resistance, an area about which few scienti?c articles have been published before. Another paper addresses renewability of security measures. Renewability is another important security technique for DRM systems, and I hope we will see more publications about this in the future. I am particularly glad that three papers cover economic and legal aspects of digital distribution of electronic goods. Technical security measures do not exist in a vacuum and their e?ectiveness interacts in a number of ways with the environment for legal enforcement. Deploying security and an- piracy measures adequately requires furthermore a good understanding of the business models that they are designed to support.

Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (IFIP Advances in Information and Communication Technology #201)

by Simone Fischer-Hübner Stefan Lindskog Kai Rannenberg Louise Yngström

This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments". The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.

Security and Privacy in Federated Learning (Digital Privacy and Security)

by Shui Yu Lei Cui

In this book, the authors highlight the latest research findings on the security and privacy of federated learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference, poisoning, generative adversarial networks, differential privacy, secure multi-party computation, homomorphic encryption, and shuffle, respectively. The book offers an essential overview for researchers who are new to the field, while also equipping them to explore this “uncharted territory.” For each topic, the authors first present the key concepts, followed by the most important issues and solutions, with appropriate references for further reading. The book is self-contained, and all chapters can be read independently. It offers a valuable resource for master’s students, upper undergraduates, Ph.D. students, and practicing engineers alike.

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

by Fei Hu

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledg

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #17)

by Shiguo Lian

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication. The papers at MobiSec 2009 dealt with a broad variety of subjects ranging from issues of trust in and security of mobile devices and embedded hardware security, over efficient cryptography for resource-restricted platforms, to advanced applications such as wireless sensor networks, user authentication, and privacy in an environment of autonomously communicating objects. With hindsight a leitmotif emerged from these contributions, which corrobarated the idea behind MobiSec; a set of powerful tools have been created in various branches of the security discipline, which await combined application to build trust and security into mobile (that is, all future) networks, autonomous and personal devices, and pervasive applications

Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #47)

by Neeli R. Prasad Shiguo Lian Andreas U. Schmidt Giovanni Russello Antonio Lioy

MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.

Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #94)

by Ramjee Prasad Károly Farkas Andreas U. Schmidt Antonio Lioy Giovanni Russello Flaminia Luccio

This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization.

Security and Privacy in Mobile Information and Communication Systems: 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #107)

by Andreas U. Schmidt Giovanni Russello Iovannis Krontiris Shiguro Lian

This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications.

Security and Privacy in Mobile Social Networks (SpringerBriefs in Computer Science)

by Xiaohui Liang Rongxing Lu Xiaodong Lin Xuemin Shen

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications."Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Security and Privacy in New Computing Environments: 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #496)

by Qi Jiang Xinghua Li Ding Wang

This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.

Security and Privacy in New Computing Environments: Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #284)

by Jin Li Zheli Liu Hao Peng

This book constitutes the refereed proceedings of the 2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on privacy and security analysis, Internet of Things and cloud computing, system building, scheme, model and application for data, mechanism and method in new computing.

Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #423)

by Wenbo Shi Xiaofeng Chen Kim-Kwang Raymond Choo

This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was “Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management”.

Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #344)

by Ding Wang Weizhi Meng Jinguang Han

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Security and Privacy in Smart Grid (SpringerBriefs in Electrical and Computer Engineering)

by Asmaa Abdallah Xuemin Shen

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

Security and Privacy in Smart Grids

by Yang Xiao

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports

Security and Privacy in Social Networks

by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony and Alex Pentland

Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings (Lecture Notes in Computer Science #14097)

by Budi Arief Anna Monreale Michael Sirivianos Shujun Li

This book constitutes the proceedings of the 9th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2023, which took place in Canterbury, UK, in August 2023.The 10 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections as follows: information abuse and political discourse; attacks; social structure and community; and security and privacy matters.Papers "Data Reconstruction Attack Against Principal Component Analysis" and "Edge local Differential Privacy for Dynamic Graphs" are published Open Access under the CC BY 4.0 License.

Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings (Communications in Computer and Information Science #1663)

by Xiaofeng Chen Xinyi Huang Mirosław Kutyłowski

This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field’s foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.

Refine Search

Showing 71,801 through 71,825 of 85,187 results