Narrow your search

Library

KU Leuven (10)

AP (9)

KDG (9)

Odisee (9)

Thomas More Kempen (9)

Thomas More Mechelen (9)

UCLL (9)

VIVES (9)

ULB (8)

ULiège (8)

More...

Resource type

book (13)

digital (9)


Language

English (22)


Year
From To Submit

2020 (4)

2018 (8)

2017 (4)

2016 (1)

2015 (2)

More...
Listing 11 - 20 of 22 << page
of 3
>>
Sort by

Book
Security and privacy in mobile social networks
Authors: --- --- ---
ISSN: 21915768 ISBN: 1461488567 1461488575 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014.

Keywords

Computer networks. --- Computer science. --- Data protection. --- Information storage and retrieval systems. --- Telecommunication. --- Computer networks --- Computer science --- Data protection --- Information storage and retrieval systems --- Telecommunication --- Online social networks --- Mobile computing --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer communication systems. --- Computer security. --- Computers. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Information Systems and Communication Service. --- Science --- Communication --- Information theory --- Telecommuting --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Information systems. --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Application software. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Engineering --- Security measures.


Book
Testbeds and Research Infrastructures for the Development of Networks and Communities : 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 3319495801 3319495798 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks.

Keywords

Computer science. --- Computer software --- Computer communication systems. --- Computer system failures. --- E-commerce. --- Computer Science. --- Computer Communication Networks. --- System Performance and Evaluation. --- Performance and Reliability. --- e-Commerce/e-business. --- Security. --- Reusability. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Reusability of software --- Reusable code (Computer programs) --- Software reusability --- Informatics --- Failures --- Commerce --- Information superhighway --- System failures (Engineering) --- Fault-tolerant computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Software reengineering --- Generic programming (Computer science) --- Science --- Distributed processing --- Computer system performance. --- Operating systems (Computers). --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Operating systems --- Computer networks --- Parallel processing (Electronic computers) --- Computer software—Reusability.


Book
East Asian Men : Masculinity, Sexuality and Desire
Authors: --- ---
ISBN: 113755634X 1137556331 9781137556332 Year: 2017 Publisher: London : Palgrave Macmillan UK : Imprint: Palgrave Macmillan,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a fresh and contemporary take on the study of men and masculinity. It highlights new and exciting approaches to sexuality, desire, men and masculinity in East Asian contexts, focusing on the interconnections between them. In doing so, it re-examines the key concepts that underpin studies of masculinity, such as homophobia, homosociality and heteronormativity. Developing new ways of thinking about masculinity in local contexts, it fills a significant lacuna in contemporary scholarship. This thought-provoking work will appeal to students and scholars of gender studies, cultural studies and the wider social sciences. .


Book
Security and Privacy in Communication Networks : 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 3319788132 3319788124 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017. The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.


Book
Security and Privacy in Communication Networks : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 3319788167 3319788159 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.


Book
Vehicular ad hoc network security and privacy
Authors: --- --- ---
ISBN: 9781119082163 1118913906 9781118913901 Year: 2015 Publisher: Hoboken [New Jersey] [Piscataqay, New Jersey] IEEE Press/Wiley IEEE Xplore

Loading...
Export citation

Choose an application

Bookmark

Abstract

Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats. Additional features of this book include: . An introduction to standardization and industry activities as well as government regulation in secure vehicular networking. Eight novel secure and privacy-preserving schemes for vehicular communications. Explorations into interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique The authors have taken a non-traditional method toward securing communications, allowing for new research directions in security and privacy in VANETs, which will be helpful to students, researchers, and IT practitioners.


Book
Networking for big data
Authors: --- --- ---
ISBN: 9781482263497 9780429156892 9780367377533 9781482263503 1482263491 Year: 2016 Publisher: Boca Raton CRC Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa


Digital
Security and Privacy in Mobile Social Networks
Authors: --- --- ---
ISBN: 9781461488576 Year: 2013 Publisher: New York, NY Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014.


Digital
East Asian Men : Masculinity, Sexuality and Desire
Authors: --- ---
ISBN: 9781137556349 Year: 2017 Publisher: London Palgrave Macmillan UK :Imprint: Palgrave Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a fresh and contemporary take on the study of men and masculinity. It highlights new and exciting approaches to sexuality, desire, men and masculinity in East Asian contexts, focusing on the interconnections between them. In doing so, it re-examines the key concepts that underpin studies of masculinity, such as homophobia, homosociality and heteronormativity. Developing new ways of thinking about masculinity in local contexts, it fills a significant lacuna in contemporary scholarship. This thought-provoking work will appeal to students and scholars of gender studies, cultural studies and the wider social sciences. .


Digital
Security and Privacy in Communication Networks : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 9783319788166 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.

Listing 11 - 20 of 22 << page
of 3
>>
Sort by