Narrow your search

Library

AP (5)

KDG (5)

KU Leuven (5)

Odisee (5)

Thomas More Kempen (5)

Thomas More Mechelen (5)

UCLL (5)

ULB (5)

ULiège (5)

VIVES (5)

More...

Resource type

book (6)

digital (5)


Language

English (10)


Year
From To Submit

2023 (2)

2018 (4)

2017 (2)

2013 (2)

Listing 1 - 10 of 10
Sort by

Book
Searchable encryption : from concepts to systems
Authors: ---
ISBN: 3031213777 3031213769 Year: 2023 Publisher: Cham, Switzerland : Springer International Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.


Multi
Searchable Encryption
Authors: --- ---
ISBN: 9783031213779 9783031213762 9783031213786 9783031213793 Year: 2023 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.


Book
Security and Privacy in Communication Networks : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings
Authors: --- --- ---
ISBN: 331959608X 3319596071 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.

Keywords

Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Artificial intelligence. --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Security. --- Data Encryption. --- Computer Communication Networks. --- Computers and Society. --- Artificial Intelligence (incl. Robotics). --- Civilization and computers --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Civilization --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Science --- Distributed processing --- Data protection. --- Cryptology. --- Artificial Intelligence. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer networks


Book
Security and Privacy in Communication Networks : 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 3319788132 3319788124 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017. The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.


Book
Security and Privacy in Communication Networks : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 3319788167 3319788159 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.


Digital
Security and Privacy in Communication Networks : 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings
Authors: --- --- ---
ISBN: 9783319596082 Year: 2017 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.


Digital
Security and Privacy in Communication Networks : SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 9783319788166 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017. The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more. The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.


Digital
Security and Privacy in Communication Networks : 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings
Authors: --- --- --- ---
ISBN: 9783319788135 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017. The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.


Book
Wireless Algorithms, Systems, and Applications : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 364239700X 3642397018 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.

Keywords

Computer science. --- Computer Communication Networks. --- Computer system performance. --- Computer software. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Computer Science, general. --- Wireless communication systems --- Mobile computing --- Engineering & Applied Sciences --- Computer Science --- Management --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Software, Computer --- Informatics --- Computer communication systems. --- Computer system failures. --- Algorithms. --- Datensicherung. --- Datenverwaltung. --- Drahtloses Sensorsystem. --- Funknetz. --- Netzwerktopologie. --- Netzwerkverwaltung. --- Topologie --- Netzform --- Netzstruktur --- Netztopologie --- Netzarchitektur --- Rechnernetz --- Radio network --- Wireless network --- Drahtloses Telekommunikationsnetz --- Telekommunikationsnetz --- Wireless sensor network --- Drahtloses Sensornetz --- Sensorsystem --- Datenmanagement --- Dateiverwaltung --- Datensicherheit --- Sicherheit --- Computersicherheit --- Softwareschutz --- Netzwerkmanagement --- Network management --- Netzmanagement --- Telecommunication systems --- Netzwerk --- Datenverarbeitung --- Science --- Computer systems --- Application software. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Failures --- Distributed processing --- Foundations --- Computer networks. --- Electronic digital computers—Evaluation. --- Computer and Information Systems Applications.


Digital
Wireless Algorithms, Systems, and Applications : 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings
Authors: --- --- --- --- --- et al.
ISBN: 9783642397011 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.

Listing 1 - 10 of 10
Sort by