TY - BOOK ID - 8508600 TI - Security and privacy in mobile social networks AU - Liang, Xiaohui. AU - Lu, Rongxing. AU - Lin, Xiaodong. AU - Shen, Xuemin. PY - 2013 SN - 21915768 SN - 1461488567 1461488575 PB - New York : Springer, DB - UniCat KW - Computer networks. KW - Computer science. KW - Data protection. KW - Information storage and retrieval systems. KW - Telecommunication. KW - Computer networks KW - Computer science KW - Data protection KW - Information storage and retrieval systems KW - Telecommunication KW - Online social networks KW - Mobile computing KW - Electrical & Computer Engineering KW - Engineering & Applied Sciences KW - Telecommunications KW - Security measures KW - Electric communication KW - Mass communication KW - Telecom KW - Telecommunication industry KW - Automatic data storage KW - Automatic information retrieval KW - Automation in documentation KW - Computer-based information systems KW - Data processing systems KW - Data storage and retrieval systems KW - Discovery systems, Information KW - Information discovery systems KW - Information processing systems KW - Information retrieval systems KW - Machine data storage and retrieval KW - Mechanized information storage and retrieval systems KW - Data governance KW - Data regulation KW - Personal data protection KW - Protection, Data KW - Informatics KW - Communication systems, Computer KW - Computer communication systems KW - Data networks, Computer KW - ECNs (Electronic communication networks) KW - Electronic communication networks KW - Networks, Computer KW - Teleprocessing networks KW - Computer communication systems. KW - Computer security. KW - Computers. KW - Electrical engineering. KW - Computer Science. KW - Computer Communication Networks. KW - Communications Engineering, Networks. KW - Information Systems Applications (incl. Internet). KW - Systems and Data Security. KW - Information Systems and Communication Service. KW - Science KW - Communication KW - Information theory KW - Telecommuting KW - Computer systems KW - Electronic information resources KW - Data libraries KW - Digital libraries KW - Information organization KW - Information retrieval KW - Data transmission systems KW - Digital communications KW - Electronic systems KW - Information networks KW - Cyberinfrastructure KW - Electronic data processing KW - Network computers KW - Distributed processing KW - Information systems. KW - Computer privacy KW - Computer system security KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Security systems KW - Hacking KW - Protection KW - Application software. KW - Automatic computers KW - Automatic data processors KW - Computer hardware KW - Computing machines (Computers) KW - Electronic brains KW - Electronic calculating-machines KW - Electronic computers KW - Hardware, Computer KW - Cybernetics KW - Machine theory KW - Calculators KW - Cyberspace KW - Application computer programs KW - Application computer software KW - Applications software KW - Apps (Computer software) KW - Computer software KW - Electric engineering KW - Engineering KW - Security measures. UR - https://www.unicat.be/uniCat?func=search&query=sysid:8508600 AB - This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014. ER -