Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Securities. --- Blue sky laws --- Capitalization (Finance) --- Investment securities --- Portfolio --- Scrip --- Securities --- Securities law --- Underwriting --- Investments --- Investment banking --- Law and legislation
Choose an application
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Information Systems and Communication Service. --- Computer Communication Networks. --- Data protection. --- Management information systems --- Computer networks --- Privacy, Right of. --- Customer relations. --- Security measures. --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Law and legislation --- Business --- Public relations --- Consumer affairs departments --- Customer advisory boards --- Relationship marketing --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Computer security --- Sociotechnical systems --- Information resources management --- Management --- Electronic data processing --- Communication systems --- Information systems. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Security measures --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Distributed processing
Listing 1 - 2 of 2 |
Sort by
|