- Table View
- List View
Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #398)
by Shujun Li Moti Yung Joaquin Garcia-Alfaro Radha Poovendran Hervé DebarThis two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #399)
by Shujun Li Moti Yung Joaquin Garcia-Alfaro Radha Poovendran Hervé DebarThis two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conference was held virtually. The 56 full papers were carefully reviewed and selected from 143 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #567)
by Xiaojiang Du Mourad Debbabi Man Ho Allen Au Xiapu Luo Haixin Duan Xavier de Carné de CarnavaletThis two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #568)
by Xiaojiang Du Mourad Debbabi Man Ho Allen Au Xiapu Luo Haixin Duan Xavier de Carné de CarnavaletThis two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
Security and Privacy in Cyber-Physical Systems and Smart Vehicles: First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #552)
by Bo Chen Yu Chen Chung-Wei Lin Qi ZhuThis book constitutes the refereed proceedings of the First EAI International Conference, SmartSP 2023, held in Chicago, USA, during October 12-13, 2023. The 11 revised full papers were carefully reviewed and selected from 24 submissions. The papers focus on all details all technological aspects that are relevant to Security and privacy in cyber-physical systems.
Security and Privacy in Cyber-Physical Systems: Foundations, Principles, and Applications
by Sabina Jeschke Houbing Song Glenn A. FinkWritten by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today’s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.
Security and Privacy in Cyberspace (Blockchain Technologies)
by Manoj Kumar Omprakash Kaiwartya Ashutosh Mishra Keshav Kaushik Sachin Kumar GuptaThis book highlights the literature and the practical aspects to understand cybersecurity and privacy in various networks and communication devices. It provides details of emerging technologies on various networks by protecting the privacy and security of cyberspace. This book presents state-of-the-art advances in the field of cryptography and network security, cybersecurity and privacy, providing a good reference for professionals and researchers.
Security and Privacy in Digital Economy: First International Conference, SPDE 2020, Quzhou, China, October 30 – November 1, 2020, Proceedings (Communications in Computer and Information Science #1268)
by Peter Mueller Shui Yu Jiangbo QianThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*.The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science.*The conference was held virtually due to the COVID-19 pandemic.
Security and Privacy in Federated Learning (Digital Privacy and Security)
by Shui Yu Lei CuiIn this book, the authors highlight the latest research findings on the security and privacy of federated learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference, poisoning, generative adversarial networks, differential privacy, secure multi-party computation, homomorphic encryption, and shuffle, respectively. The book offers an essential overview for researchers who are new to the field, while also equipping them to explore this “uncharted territory.” For each topic, the authors first present the key concepts, followed by the most important issues and solutions, with appropriate references for further reading. The book is self-contained, and all chapters can be read independently. It offers a valuable resource for master’s students, upper undergraduates, Ph.D. students, and practicing engineers alike.
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations
by Fei HuThe Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledg
Security and Privacy in Mobile Social Networks
by Xiaodong Lin Rongxing Lu Xuemin Shen Xiaohui LiangThis book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic. . . The chapters are well motivated and presented. . . It is recommended for researchers. " -ACM Computing Reviews, 21 July 2014
Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #423)
by Kim-Kwang Raymond Choo Xiaofeng Chen Wenbo ShiThis book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was “Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management”.
Security and Privacy in New Computing Environments: 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #496)
by Ding Wang Qi Jiang Xinghua LiThis book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.
Security and Privacy in New Computing Environments: 6th International Conference, SPNCE 2023, Guangzhou, China, November 25–26, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #525)
by Jun Cai Zhili Zhou Kongyang ChenThis book constitutes the refereed proceedings of the 6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023, held in Guangzhou, China, during November 25-26, 2023. The 29 full papers were selected from 75 submissions and are grouped in these thematical parts: IoT, network security and privacy challenges; multi-party privacy preserving neural networks; security and privacy steganography and forensics.
Security and Privacy in New Computing Environments: Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #284)
by Jin Li Hao Peng Zheli LiuThis book constitutes the refereed proceedings of the 2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on privacy and security analysis, Internet of Things and cloud computing, system building, scheme, model and application for data, mechanism and method in new computing.
Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #344)
by Ding Wang Jinguang Han Weizhi MengThis book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
Security and Privacy in Smart Environments (Lecture Notes in Computer Science #14800)
by Sokratis Katsikas Nikolaos PitropakisThis volume gives readers an understanding of the multifaceted threats posed by the evolving cybersecurity landscape in smart environments, while also offering strategic insights into mitigative measures and proactive solutions. The chapters in the first part explain the current state of smart environments, shedding light on their complexities and vulnerabilities. The second part provides a fresh perspective on existing technologies and cyber challenges within the context of the modern era, offering novel insights and analyses. The third part is dedicated to exploring the intricacies of critical infrastructures. The concluding section offers a succinct overview of distributed ledger and privacy enhancement approaches, underscoring their potential role in fortifying cybersecurity measures. The contributors are among the leading researchers in the areas of smart environments, information security, and privacy, and the content will be of value to researchers in academia and industry, and security practitioners and policymakers.
Security and Privacy in Smart Grid (SpringerBriefs in Electrical and Computer Engineering)
by Xuemin Shen Asmaa AbdallahThis SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.
Security and Privacy in Smart Grids
by Yang XiaoPresenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports
Security and Privacy in Social Networks
by Yuval Elovici Armin B. Cremers Nadav Aharony Yaniv Altshuler Alex PentlandSecurity and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.
Security and Privacy in Social Networks and Big Data: 10th International Symposium, SocialSec 2024, Abu Dhabi, United Arab Emirates, November 20–22, 2024, Proceedings (Lecture Notes in Computer Science #15565)
by Kim-Kwang Raymond Choo Saed Alrabaee Monther Aldwairi Mohammad Tubishat Mousa Al-Kfairy Omar AlfandiThis book LNCS 15565 constitutes the referred proceedings of the 10th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024. The 8 full papers and 2 short papers were carefully reviewed and selected from 22 submissions. The conference focus on Analysis of Social Media Perspectives, Privacy and Security Issues, Machine Learning and Intelligent Systems.
Security and Privacy in Social Networks and Big Data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers (Communications in Computer and Information Science #1095)
by Steven Furnell Weizhi MengThis book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
Security and Privacy in Social Networks and Big Data: 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings (Communications in Computer and Information Science #1298)
by Jin Li Yang Xiang Zheli LiuThis book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.
Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings (Communications in Computer and Information Science #1495)
by Chia-Wei Lee Limei Lin Yuhong LiuThis book constitutes revised and selected papers from the 7th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2021, held in Fuzhou, China, in November 2021.The 16 full papers presented in this volume were carefully reviewed and selected from a total of 41 submissions. Such themes as privacy protection, security of AI, mobile social networks, Big Data system, applied cryptography, and others are covered in the volume.The papers are organized in the following topical sections: Applied Cryptography for Big Data; Big Data System Security; Forensics in Social Networks and Big Data; Privacy Protection in Social Networks; Security and Privacy in Big Database; Security of AI; Trust and Reputations in Social Networks.
Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings (Communications in Computer and Information Science #1663)
by Xinyi Huang Xiaofeng Chen Mirosław KutyłowskiThis book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field’s foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.