Søkt på: Serie Synthesis Lectures on Information Security, Privacy, and Trust
totalt 26 treff
Analysis Techniques for Information Security
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and …
Privacy Risk Analysis of Online Social Networks
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy …
Operating System Security
Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating …
Anomaly Detection as a Service
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider …
Privacy for Location-based Services
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution …
Differential Privacy
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion …
A Journey into Security Certification
This book, authored by some of the pioneers in the security certification domain, provides a foundational knowledge base for designing and deploying effective security …
Physically Unclonable Functions (PUFs)
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive …
Private Information Retrieval
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the …
Digital Forensic Science
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal …
Privacy Risk Analysis
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk …
The Curious Case of Usable Privacy
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, …