You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in academia, industry, and government.
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ICISA (the International Commu- cations and Information Security Association). It was held at Columbia University in New York, USA, June 7–10, 2005. This conference proceedings volume contains papers presented in the academic/research track. ACNS covers a large number of research areas that have been gaining importance in recent years due to the development of the Internet, wireless communication and the increased global exposure of computing resources. The papers in this volume are representative of the state of the art in security and cryptography research, worldwide. The Program Committee of the conference received a total of 158 submissions from all over the world, of which 35 submissions were selected for presentation at the a- demic track. In addition to this track, the conference also hosted a technical/ industrial/ short papers track whose presentations were also carefully selected from among the submissions. All submissions were reviewed by experts in the relevant areas.
This volume, LNCS 3424, holds the proceedings from PET 2004 in Toronto.
This book presents the latest research findings, methods and development techniques, challenges and solutions concerning UPC from both theoretical and practical perspectives, with an emphasis on innovative, mobile and Internet services. With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in Ubiquitous and Pervasive Computing (UPC), which makes it possible to create a human-oriented computing environment in which computer chips are embedded in everyday objects and interact with the physical world. Through UPC, people can go online even while moving around, thus enjoying nearly permanent access to their preferred services. Though it has the potential to revolutionize our lives, UPC also poses a number of new research challenges.
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following workshops: Second International Workshop on Security in Self-Organising Networks (Self Net 2014); Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2014); Second International Workshop on Trust and Privacy in Cyberspace (Cyber Trust 2014).
This book presents original, peer-reviewed research papers from the 4th Purple Mountain Forum –International Forum on Smart Grid Protection and Control (PMF2019-SGPC), held in Nanjing, China on August 17–18, 2019. Addressing the latest research hotspots in the power industry, such as renewable energy integration, flexible interconnection of large scale power grids, integrated energy system, and cyber physical power systems, the papers share the latest research findings and practical application examples of the new theories, methodologies and algorithms in these areas. As such book a valuable reference for researchers, engineers, and university students.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.
This book presents original contributions to the theories and practices of emerging Internet, data, and web technologies and their applicability in businesses, engineering, and academia. Internet has become the most proliferative platform for emerging large-scale computing paradigms. Among these, data and web technologies are two most prominent paradigms, in a variety of forms such as data centers, cloud computing, mobile cloud, mobile web services, and so on. These technologies altogether create a digital ecosystem whose corner stone is the data cycle, from capturing to processing, analysis, and visualization. The investigation of various research and development issues in this digital ecos...