- Table View
- List View
Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations
by Fei HuThe Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledg
Security and Privacy in IoMT: Challenges and Solutions (River Publishers Rapids Series in Digital Security and Forensics)
by Deepak Gupta Anuj Kumar Singh Yu-Dong Eugene ZhangThis book explores Internet of Medical Things (IoMT) security and privacy in electronic healthcare, addressing vulnerabilities in medical devices that expose patient data to cyber-attacks. It covers IoMT security challenges, potential attacks, and solutions considering resource constraints, network architecture, and communication protocols.IoMT is revolutionizing the medical sector by providing personalized and targeted treatments and by facilitating seamless communication of medical data. IoMT devices are more trustworthy in monitoring and tracking due to higher accuracy levels, which also minimize human errors and inaccurate reporting. While the merits of IoMT devices are clear, they also pose severe privacy and security risks. Medical systems acquire, process, and perform decision-making based on this sensitive health information. Cyber attackers who exploit the flaws and weaknesses in these IoMT devices might well be able to penetrate the hospital network and gain unauthorized access to private patient data. Attacks on these IoMT devices also have the potential to endanger the patients' lives and cause serious physical harm.In addition to outlining viable solutions that take into account constrained resources at IoMT end-devices, hybrid network architecture, application characteristics, and communication protocols, the book covers the core concepts of IoMT security and privacy. It describes both theoretical and practical aspects for those working in security in the IoMT, emphasizing the most significant potential IoT security issues and challenges.
Security and Privacy in Mobile Social Networks
by Xiaodong Lin Rongxing Lu Xuemin Shen Xiaohui LiangThis book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic. . . The chapters are well motivated and presented. . . It is recommended for researchers. " -ACM Computing Reviews, 21 July 2014
Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #423)
by Kim-Kwang Raymond Choo Xiaofeng Chen Wenbo ShiThis book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was “Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management”.
Security and Privacy in New Computing Environments: 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #496)
by Ding Wang Qi Jiang Xinghua LiThis book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.
Security and Privacy in New Computing Environments: 6th International Conference, SPNCE 2023, Guangzhou, China, November 25–26, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #525)
by Jun Cai Zhili Zhou Kongyang ChenThis book constitutes the refereed proceedings of the 6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023, held in Guangzhou, China, during November 25-26, 2023. The 29 full papers were selected from 75 submissions and are grouped in these thematical parts: IoT, network security and privacy challenges; multi-party privacy preserving neural networks; security and privacy steganography and forensics.
Security and Privacy in New Computing Environments: Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #284)
by Jin Li Hao Peng Zheli LiuThis book constitutes the refereed proceedings of the 2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on privacy and security analysis, Internet of Things and cloud computing, system building, scheme, model and application for data, mechanism and method in new computing.
Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #344)
by Ding Wang Jinguang Han Weizhi MengThis book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
Security and Privacy in Smart Environments (Lecture Notes in Computer Science #14800)
by Sokratis Katsikas Nikolaos PitropakisThis volume gives readers an understanding of the multifaceted threats posed by the evolving cybersecurity landscape in smart environments, while also offering strategic insights into mitigative measures and proactive solutions. The chapters in the first part explain the current state of smart environments, shedding light on their complexities and vulnerabilities. The second part provides a fresh perspective on existing technologies and cyber challenges within the context of the modern era, offering novel insights and analyses. The third part is dedicated to exploring the intricacies of critical infrastructures. The concluding section offers a succinct overview of distributed ledger and privacy enhancement approaches, underscoring their potential role in fortifying cybersecurity measures. The contributors are among the leading researchers in the areas of smart environments, information security, and privacy, and the content will be of value to researchers in academia and industry, and security practitioners and policymakers.
Security and Privacy in Smart Grid (SpringerBriefs in Electrical and Computer Engineering)
by Xuemin Shen Asmaa AbdallahThis SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.
Security and Privacy in Smart Grids
by Yang XiaoPresenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports
Security and Privacy in Social Networks
by Yuval Elovici Armin B. Cremers Nadav Aharony Yaniv Altshuler Alex PentlandSecurity and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.
Security and Privacy in Social Networks and Big Data: 10th International Symposium, SocialSec 2024, Abu Dhabi, United Arab Emirates, November 20–22, 2024, Proceedings (Lecture Notes in Computer Science #15565)
by Kim-Kwang Raymond Choo Saed Alrabaee Monther Aldwairi Mohammad Tubishat Mousa Al-Kfairy Omar AlfandiThis book LNCS 15565 constitutes the referred proceedings of the 10th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2024, held in Abu Dhabi, United Arab Emirates, during November 20–22, 2024. The 8 full papers and 2 short papers were carefully reviewed and selected from 22 submissions. The conference focus on Analysis of Social Media Perspectives, Privacy and Security Issues, Machine Learning and Intelligent Systems.
Security and Privacy in Social Networks and Big Data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers (Communications in Computer and Information Science #1095)
by Steven Furnell Weizhi MengThis book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.
Security and Privacy in Social Networks and Big Data: 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings (Communications in Computer and Information Science #1298)
by Jin Li Yang Xiang Zheli LiuThis book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020, held in Tianjin, China, in September 2020. The 38 full papers presented in this volume were carefully reviewed and selected from a total of 111 submissions. The papers are organized according to the topical sections on big data security; social networks; privacy-preserving and security.
Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings (Communications in Computer and Information Science #1495)
by Chia-Wei Lee Limei Lin Yuhong LiuThis book constitutes revised and selected papers from the 7th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2021, held in Fuzhou, China, in November 2021.The 16 full papers presented in this volume were carefully reviewed and selected from a total of 41 submissions. Such themes as privacy protection, security of AI, mobile social networks, Big Data system, applied cryptography, and others are covered in the volume.The papers are organized in the following topical sections: Applied Cryptography for Big Data; Big Data System Security; Forensics in Social Networks and Big Data; Privacy Protection in Social Networks; Security and Privacy in Big Database; Security of AI; Trust and Reputations in Social Networks.
Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings (Communications in Computer and Information Science #1663)
by Xinyi Huang Xiaofeng Chen Mirosław KutyłowskiThis book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field’s foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.
Security and Privacy in Social Networks and Big Data: 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14–16, 2023, Proceedings (Lecture Notes in Computer Science #14097)
by Shujun Li Anna Monreale Budi Arief Michael SirivianosThis book constitutes the proceedings of the 9th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2023, which took place in Canterbury, UK, in August 2023.The 10 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections as follows: information abuse and political discourse; attacks; social structure and community; and security and privacy matters.Papers "Data Reconstruction Attack Against Principal Component Analysis" and "Edge local Differential Privacy for Dynamic Graphs" are published Open Access under the CC BY 4.0 License.
Security and Privacy in Web 3.0 (Digital Privacy and Security)
by Wei Wang Liehuang Zhu Meng Shen Xiangyun TangWeb 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is designed to address issues encountered in the previous generation of the Internet such as imbalanced distribution of interests, monopoly of platform resources, and leakage of personal privacy. This book explores the challenges and solutions related to ensuring security and privacy in the context of the evolving Web 3.0 architecture. Web 3.0 represents the next generation of the web, characterized by decentralized networks, blockchain technology, and enhanced user control over data. As Web 3.0 evolves, the focus on addressing security and privacy concerns becomes increasingly crucial. This book provides a comprehensive understanding of the security and privacy issues specific to Web 3.0 and offers practical defense frameworks and methods to mitigate these challenges. This book is dedicated to the specific aspects of security and privacy in Web 3.0, from introducing the architecture and addressing the inherent issues to presenting innovative methods for privacy-preserving computing, user behavior identification, and abnormal transaction detection. It is of particular interest to researchers in the field of Web 3.0, blockchain, and network security, as it summarizes the security and privacy concerns in Web 3.0 and brings a number of innovative technologies and practical solutions to protect sensitive data and maintain user privacy in Web 3.0 environments, equipping researchers with the knowledge necessary to design secure and privacy-aware applications and systems in Web 3.0.
Security and Privacy in the Internet of Things
by Syed Rameem Zahra Mohammad Ahsan ChishtiThis book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. • Covers all aspects of security • Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions • Discusses ways for achieving better access control and trust in the IoT ecosystem • Contributes exhaustive strategic plans to deal with security issues of IoT • Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
Security and Privacy of Cyber-Physical Systems: Emerging Trends, Technologies, and Applications (River Publishers Series in Digital Security and Forensics)
by Mohammad Hammoudeh Agbotiname Lucky Imoize Webert Montlouis Segun I. PopoolaThis book examines vulnerability threats and attack detection and mitigation, including the associated legal requirements, regulatory frameworks, and policies for enabling the security and privacy of cyber-physical systems. It provides researchers, academics, and practitioners with new insights into the real-world scenarios of deploying, applying, and managing security and privacy frameworks in modern cyber-physical systems.It addresses critical security and privacy concerns, including theoretical analysis, novel system architecture design and implementation, vulnerability discovery, analysis, mitigation, emerging application scenarios, experimental frameworks, and social and ethical dilemmas affecting all parties in cyber-physical systems. The book is an ideal reference for practitioners and researchers in cyber-physical systems, security and privacy, the Internet of Things, advanced cryptography, cyber defensive walls, industrial systems, and cyber threats. It is also a suitable textbook for graduate and senior undergraduate courses in these subjects.
Security and Privacy: 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20–21, 2024, Proceedings (Communications in Computer and Information Science #2489)
by Sihem Mesnager Pantelimon Stănică Sumit Kumar DebnathThis book constitutes the refereed proceedings of the Third International Conference on Security and Privacy, ICSP 2024, held in Jamshedpur, India, during November 20–21, 2024. The 12 full papers and 1 short paper included in this book were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: Cryptanalysis and Other Attacks; Boolean Functions; Authentication and authorization, Cyber-physical systems security, Privacy-preserving technologies; Blockchain and Cryptocurrency, IoT security and privacy, Database security; Quantum Cryptography.
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papers (Communications in Computer and Information Science #939)
by Manoj Singh Gaur Virendra Singh Sukumar Nandi Devesh Jinwala Vijay Laxmi Parvez FarukiThis book constitutes the refereed proceedings of the Second International Conference on Security and Privacy, ISEA-ISAP 2018, held in Jaipur, India, in January 2019. The conference was originally planned to be held in 2018 which is why the acronym contains "2018". The 21 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections: authentication and access control, malware analysis, network security, privacy preservation, secure software systems and social network analytics.
Security and Privacy: Second International Conference, ICSP 2021, Jamshedpur, India, November 16–17, 2021, Proceedings (Communications in Computer and Information Science #1497)
by Sihem Mesnager Pantelimon Stănică Sumit Kumar DebnathThis book constitutes the refereed proceedings of the Second International Conference, ICSP 2021, held in Jamshedpur, India, in November 2021. The 10 full papers were carefully reviewed and selected from 44 submissions. The contributions are organized in the following blocks: Cryptanalysis and other attacks; Symmetric cryptography and hash functions; Mathematical foundations of cryptography; Embedded systems security; Security in hardware; Authentication, Key management, Public key (asymmetric) techniques, and Information-theoretic techniques.
Security and Privacy: Select Proceedings of ICSP 2020 (Lecture Notes in Electrical Engineering #744)
by Pantelimon Stănică Sugata Gangopadhyay Sumit Kumar DebnathThis book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.