Fr. 69.00

Security and Privacy in Mobile Social Networks

Inglese · Tascabile

Spedizione di solito entro 1 a 2 settimane (il titolo viene stampato sull'ordine)

Descrizione

Ulteriori informazioni

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications.

"Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Sommario

Overview.- Profile Matching Protocol with Anonymity Enhancing Techniques.- Cooperative Data Forwarding Strategy with Privacy Preservation.- Recommendation-based Trustworthy Service Evaluation.

Riassunto

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications.
"Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Testo aggiuntivo

From the book reviews:
“Security and privacy are two important issues in social networks. … This book, divided into four chapters, approaches the topic from a research perspective. … It is recommended for researchers interested in security and privacy concerns in mobile social networks.” (Mercedes Martínez González, Computing Reviews, July, 2014)

Relazione

From the book reviews:
"Security and privacy are two important issues in social networks. ... This book, divided into four chapters, approaches the topic from a research perspective. ... It is recommended for researchers interested in security and privacy concerns in mobile social networks." (Mercedes Martínez González, Computing Reviews, July, 2014)

Dettagli sul prodotto

Autori Xiaohu Liang, Xiaohui Liang, Xiaodong Lin, Xiaodong et al Lin, Rongxin Lu, Rongxing Lu, Xuemin Shen, Xuemin (Sherman) Shen, Xuemin Sherman Shen
Editore Springer, Berlin
 
Lingue Inglese
Formato Tascabile
Pubblicazione 25.07.2013
 
EAN 9781461488569
ISBN 978-1-4614-8856-9
Pagine 100
Dimensioni 154 mm x 236 mm x 8 mm
Peso 192 g
Illustrazioni VIII, 100 p. 27 illus.
Serie SpringerBriefs in Computer Science
SpringerBriefs in Computer Science
Categorie Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Comunicazione dati, reti

Computersicherheit, Informationssystem, Datenbank, Telekommunikation, Informatik, Nachrichtentechnik, it, Nachrichtententechnik, Telekommunikation, Netzwerksicherheit, Server, Informationstechnik (IT), allgemeine Themen, datensicherheit, informationstechnologie, Suchmaschine, Netzwerk (elektronisch), Netzwerk-Hardware, Recherche - Information Retrieval, Internet / Suchmethoden, Spezielle Anwender, Informationsrückgewinnung, Information Retrieval, Internet / Client/Server, Maschine / Suchmaschine, Technologie / Informationstechnologie, Database, Kommunikation (Technik) / Telekommunikation, Sicherheit / Datensicherheit, COMPUTERS / Security / General, Datensicherung, Datensicherheit / Netz, COMPUTERS / Information Technology, TECHNOLOGY & ENGINEERING / Telecommunications, COMPUTERS / Networking / Hardware, EDV / Theorie / Sicherheit, C; SCI13022 - Computer Communication Networks; SCI14050 - Systems and Data Security; SCI18008 - Information Systems and Communication Service; SCI18040 - Information Systems Applications (incl.Internet); SCT24035 - Communications Engineering, Network, COMPUTERS / Online Services

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.