Choose an application
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014.
Computer networks. --- Computer science. --- Data protection. --- Information storage and retrieval systems. --- Telecommunication. --- Computer networks --- Computer science --- Data protection --- Information storage and retrieval systems --- Telecommunication --- Online social networks --- Mobile computing --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer communication systems. --- Computer security. --- Computers. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Information Systems and Communication Service. --- Science --- Communication --- Information theory --- Telecommuting --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Information systems. --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Application software. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Engineering --- Security measures.
Choose an application
This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks.
Computer science. --- Computer software --- Computer communication systems. --- Computer system failures. --- E-commerce. --- Computer Science. --- Computer Communication Networks. --- System Performance and Evaluation. --- Performance and Reliability. --- e-Commerce/e-business. --- Security. --- Reusability. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Informatics --- Failures --- Commerce --- Information superhighway --- System failures (Engineering) --- Fault-tolerant computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Software reengineering --- Generic programming (Computer science) --- Science --- Distributed processing --- Computer system performance. --- Operating systems (Computers). --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- Computer networks --- Parallel processing (Electronic computers) --- Computer software—Reusability.
Choose an application
This book provides a fresh and contemporary take on the study of men and masculinity. It highlights new and exciting approaches to sexuality, desire, men and masculinity in East Asian contexts, focusing on the interconnections between them. In doing so, it re-examines the key concepts that underpin studies of masculinity, such as homophobia, homosociality and heteronormativity. Developing new ways of thinking about masculinity in local contexts, it fills a significant lacuna in contemporary scholarship. This thought-provoking work will appeal to students and scholars of gender studies, cultural studies and the wider social sciences. .
Social sciences. --- Asia --- Sociology. --- Ethnicity. --- Sexual behavior. --- Sexual psychology. --- Sex (Psychology). --- Gender expression. --- Gender identity. --- Social Sciences. --- Gender Studies. --- Ethnicity Studies. --- Sexual Behavior. --- Asian Politics. --- Sex identity (Gender identity) --- Sexual identity (Gender identity) --- Identity (Psychology) --- Sex (Psychology) --- Queer theory --- Expression, Gender --- Sex role --- Psychology, Sexual --- Sex --- Sexual behavior, Psychology of --- Sexual psychology --- Sensuality --- Ethnic identity --- Group identity --- Cultural fusion --- Multiculturalism --- Cultural pluralism --- Social theory --- Social sciences --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Politics and government. --- Psychological aspects --- Masculinity --- Men --- Human males --- Human beings --- Males --- Effeminacy --- Masculinity (Psychology) --- Desire. --- Hommes --- Désir --- Sexual behavior --- Sexualité --- Asia-Politics and government. --- Asia—Politics and government. --- East Asia. --- East --- Eastern Asia --- Far East
Choose an application
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017. The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Security. --- Data Encryption. --- Computer Communication Networks. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Data protection. --- Cryptology. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Telecommunication systems --- Computer networks
Choose an application
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.
Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Security. --- Data Encryption. --- Computer Communication Networks. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Data protection. --- Cryptology. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Telecommunication systems
Choose an application
Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats. Additional features of this book include: . An introduction to standardization and industry activities as well as government regulation in secure vehicular networking. Eight novel secure and privacy-preserving schemes for vehicular communications. Explorations into interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique The authors have taken a non-traditional method toward securing communications, allowing for new research directions in security and privacy in VANETs, which will be helpful to students, researchers, and IT practitioners.
Choose an application
Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa
Cyberinfrastructure --- Big data --- Distributed databases --- Storage area networks (Computer networks) --- Information networks --- Information storage and retrieval systems --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data centers --- Digital libraries --- Information organization --- Information retrieval --- Automated information networks --- Networks, Information --- Information services --- Data sets, Large --- Large data sets --- Data sets
Choose an application
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014.
Telecommunication technology --- Mass communications --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- draadloze computernetwerken --- mobiele netwerken --- computers --- informatica --- informatiesystemen --- tekstverwerking --- computerbeveiliging --- computernetwerken --- computerkunde --- communicatietechnologie
Choose an application
This book provides a fresh and contemporary take on the study of men and masculinity. It highlights new and exciting approaches to sexuality, desire, men and masculinity in East Asian contexts, focusing on the interconnections between them. In doing so, it re-examines the key concepts that underpin studies of masculinity, such as homophobia, homosociality and heteronormativity. Developing new ways of thinking about masculinity in local contexts, it fills a significant lacuna in contemporary scholarship. This thought-provoking work will appeal to students and scholars of gender studies, cultural studies and the wider social sciences. .
Sociology of the family. Sociology of sexuality --- Sociology --- International relations. Foreign policy --- Sexology --- History of civilization --- internationale politiek --- minderheden --- seksueel gedrag --- sociologie --- gender --- Asia
Choose an application
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.
Production management --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- veiligheid (mensen) --- cloud computing --- IoT (Internet of Things) --- informatica --- computerbeveiliging --- computernetwerken