Information Security, Privacy, and Trust

SERIES EDITORS:
Elisa Bertino, Purdue University
Ravi Sandhu, University of Texas, San Antonio
This series publishes on topics pertaining to all aspects of the theory and practice of Information Security, Privacy, and Trust. The scope largely follows the purview of premier computer security research journals such as ACM Transactions on Information and System Security, IEEE Transactions on Dependable and Secure Computing and Journal of Cryptology, and premier research conferences, such as ACM CCS, ACM SACMAT, ACM AsiaCCS, ACM CODASPY, IEEE Security and Privacy, IEEE Computer Security Foundations, ACSAC, ESORICS, Crypto, EuroCrypt and AsiaCrypt. In addition to the research topics typically covered in such journals and conferences, the series also solicits lectures on legal, policy, social, business, and economic issues addressed to a technical audience of scientists and engineers. Lectures on significant industry developments by leading practitioners are also solicited.

Series ISSNs: 1945-9742 print and 1945-9750 electronic



Anomaly Detection as a Service Anomaly Detection as a Service
Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks....
Publication Date: October, 2017

Read More


Cyber-Physical Security and Privacy in the Electric Smart Grid Cyber-Physical Security and Privacy in the Electric Smart Grid
Bruce McMillin, Thomas Roth
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Existing standards are compared with classical results and the security and privacy principles of current practice are illustrated. The book paints...
Publication Date: August, 2017

Read More


Blocks and Chains Blocks and Chains
Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar Weippl
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include:...
Publication Date: June, 2017

Read More


Digital Forensic Science Digital Forensic Science
Vassil Roussev
Digital forensic science, or digital forensics, is the application of scientific tools and methods to identify, collect, and analyze digital (data) artifacts in support of legal proceedings. From a more technical perspective, it is the process of rec...
Publication Date: December, 2016

Read More


Differential Privacy Differential Privacy
Ninghui Li, Min Lyu, Dong Su, Weining Yang
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analy...
Publication Date: October, 2016

Read More


Privacy Risk Analysis Privacy Risk Analysis
Sourya Joyee De, Daniel Le Metayer
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.

The deployment of new information technologies can l...
Publication Date: September, 2016

Read More


Introduction to Secure Outsourcing Computation Introduction to Secure Outsourcing Computation
Xiaofeng Chen
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as th...
Publication Date: February, 2016

Read More


Database Anonymization Database Anonymization
Josep Domingo-Ferrer, David Sanchez, Jordi Soria-Comas
The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anon...
Publication Date: January 11, 2016

Read More


Automated Software Diversity Automated Software Diversity
Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value f...
Publication Date: December 23, 2015

Read More


Trust in Social Media Trust in Social Media
Jiliang Tang, Huan Liu
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for on...
Publication Date: September, 2015

Read More


Physically Unclonable Functions (PUFs) Physically Unclonable Functions (PUFs)
Christian Wachsmann, Ahmad-Reza Sadeghi
Today, embedded systems are used in many security-critical applications, from access control, electronic tickets, sensors, and smart devices (e.g., wearables) to automotive applications and critical infrastructures. These systems are increasingly use...
Publication Date: 12/01/2014

Read More


Usable Security Usable Security
Simson Garfinkel, Heather Richter Lipford
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as "usable security." Although usability and security were once thought to be inherently a...
Publication Date: 09/01/2014

Read More


Reversible Digital Watermarking Reversible Digital Watermarking
Ruchira Naskar, Rajat Subhra Chakraborty
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates ...
Publication Date: 02/01/2014

Read More


Mobile Platform Security Mobile Platform Security
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious pa...
Publication Date: 12/01/2013

Read More


Security and Trust in Online Social Networks Security and Trust in Online Social Networks
Barbara Carminati, Elena Ferrari, Marco Viviani
The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easi...
Publication Date: 12/01/2013

Read More


RFID Security and Privacy RFID Security and Privacy
Yingjiu Li, Robert Deng, Elisa Bertino
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful...
Publication Date: 12/01/2013

Read More


Hardware Malware Hardware Malware
Edgar Weippl, Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information ...
Publication Date: 09/01/2013

Read More


Private Information Retrieval Private Information Retrieval
Xun Yi, Russell Paulet, Elisa Bertino
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect ...
Publication Date: 09/01/2013

Read More


Privacy for Location-based Services Privacy for Location-based Services
Gabriel Ghinita
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concer...
Publication Date: 04/01/2013

Read More


Enhancing Information Security and Privacy by Combining Biometrics with Cryptography Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
Sanjay Kanade, Dijana Petrovska-Delacretaz, Bernadette Dorizzi
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification a...
Publication Date: 01/01/2012

Read More



Result Pages:  1  2  [Next >>]  Displaying 1 to 20 (of 22 products)
Browse by Subject
Case Studies in Engineering
ACM Books
IOP Concise Physics
SEM Books
0 items
LATEST NEWS

Newsletter
Note: Registered customers go to: Your Account to subscribe.

E-Mail Address:

Your Name: