Fr. 69.00

Security and Privacy in Mobile Social Networks

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications.

"Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

List of contents

Overview.- Profile Matching Protocol with Anonymity Enhancing Techniques.- Cooperative Data Forwarding Strategy with Privacy Preservation.- Recommendation-based Trustworthy Service Evaluation.

Summary

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications.
"Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Additional text

From the book reviews:
“Security and privacy are two important issues in social networks. … This book, divided into four chapters, approaches the topic from a research perspective. … It is recommended for researchers interested in security and privacy concerns in mobile social networks.” (Mercedes Martínez González, Computing Reviews, July, 2014)

Report

From the book reviews:
"Security and privacy are two important issues in social networks. ... This book, divided into four chapters, approaches the topic from a research perspective. ... It is recommended for researchers interested in security and privacy concerns in mobile social networks." (Mercedes Martínez González, Computing Reviews, July, 2014)

Product details

Authors Xiaohu Liang, Xiaohui Liang, Xiaodong Lin, Xiaodong et al Lin, Rongxin Lu, Rongxing Lu, Xuemin Shen, Xuemin (Sherman) Shen, Xuemin Sherman Shen
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 25.07.2013
 
EAN 9781461488569
ISBN 978-1-4614-8856-9
No. of pages 100
Dimensions 154 mm x 236 mm x 8 mm
Weight 192 g
Illustrations VIII, 100 p. 27 illus.
Series SpringerBriefs in Computer Science
SpringerBriefs in Computer Science
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks

Computersicherheit, Informationssystem, Datenbank, Telekommunikation, Informatik, Nachrichtentechnik, it, Nachrichtententechnik, Telekommunikation, Netzwerksicherheit, Server, Informationstechnik (IT), allgemeine Themen, datensicherheit, informationstechnologie, Suchmaschine, Netzwerk (elektronisch), Netzwerk-Hardware, Recherche - Information Retrieval, Internet / Suchmethoden, Spezielle Anwender, Informationsrückgewinnung, Information Retrieval, Internet / Client/Server, Maschine / Suchmaschine, Technologie / Informationstechnologie, Database, Kommunikation (Technik) / Telekommunikation, Sicherheit / Datensicherheit, COMPUTERS / Security / General, Datensicherung, Datensicherheit / Netz, COMPUTERS / Information Technology, TECHNOLOGY & ENGINEERING / Telecommunications, COMPUTERS / Networking / Hardware, EDV / Theorie / Sicherheit, C; SCI13022 - Computer Communication Networks; SCI14050 - Systems and Data Security; SCI18008 - Information Systems and Communication Service; SCI18040 - Information Systems Applications (incl.Internet); SCT24035 - Communications Engineering, Network, COMPUTERS / Online Services

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.