![]() |
Security and Trust in Online Social Networks
ISBN: 9783031012112 / Angielski / Miękka / 110 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to...
The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occ...
|
cena:
132,80 |
![]() |
Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
ISBN: 9783031012075 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics,...
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptog...
|
cena:
132,80 |
![]() |
Differential Privacy: From Theory to Practice
ISBN: 9783031012228 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analysis tasks. This Synthesis Lecture is the first of two volumes on differential privacy. This lecture differs from the existing books and surveys on differential privacy in that we take an approach balancing theory and practice. We focus on empirical accuracy performances of algorithms rather than asymptotic accuracy guarantees. At the same time,...
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis a...
|
cena:
261,63 |
![]() |
Mobile Platform Security
ISBN: 9783031012136 / Angielski / Miękka / 112 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model...
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The cur...
|
cena:
132,80 |
![]() |
Introduction to Secure Outsourcing Computation
ISBN: 9783031012204 / Angielski / Miękka / 79 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for...
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can...
|
cena:
132,80 |
![]() |
Automated Software Diversity
ISBN: 9783031012181 / Angielski / Miękka / 92 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization...
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that u...
|
cena:
112,68 |
![]() |
Privacy Risk Analysis
ISBN: 9783031012211 / Angielski / Miękka / 117 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation,...
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conduc...
|
cena:
160,99 |
![]() |
Private Information Retrieval
ISBN: 9783031012099 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database...
|
cena:
132,80 |
![]() |
Usable Security: History, Themes, and Challenges
ISBN: 9783031012150 / Angielski / Miękka / 150 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to...
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquia...
|
cena:
132,80 |
![]() |
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N
ISBN: 9783031069437 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic... The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and App... |
cena:
483,04 |
![]() |
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N
ISBN: 9783031070815 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic... The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and App... |
cena:
644,07 |
![]() |
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N
ISBN: 9783031070846 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022. The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows: Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation; Part II: Cryptographic Protocols; Cryptographic... The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and App... |
cena:
644,07 |
![]() |
Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, Icais 2022, Qinghai, China, Ju
ISBN: 9783031067631 / Angielski / Miękka / 756 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and...
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligenc...
|
cena:
523,30 |
![]() |
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography: Efficient Modular Exponential Techniques
ISBN: 9783030745264 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very...
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann k...
|
cena:
684,33 |
![]() |
ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings
ISBN: 9783030781224 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*
The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine... This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 202...
|
cena:
563,56 |
![]() |
Applied Cryptography and Network Security: 20th International Conference, Acns 2022, Rome, Italy, June 20-23, 2022, Proceedings
ISBN: 9783031092336 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.
The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 174 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography. The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which ...
|
cena:
523,30 |
![]() |
The Personal Finance Guide for Tech Professionals: Building, Protecting, and Transferring Your Wealth
ISBN: 9781484282410 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
211,90 |
![]() |
Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors
ISBN: 9781484283202 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
127,12 |
![]() |
IAPP CIPM Certified Information Privacy Manager Study Guide
ISBN: 9781394153800 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
244,89 |
![]() |
Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach
ISBN: 9783030772246 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting...
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they...
|
cena:
201,24 |