|
Showing 1 - 7 of
7 matches in All Departments
This book comprehensively reviews searchable encryption, which
represents a series of research developments that directly enable
search functionality over encrypted data. The book majorly covers:
1) the design and implementation of encrypted search algorithms,
data structures, and systems that facilitate various forms of
search over always-encrypted databases; 2) different threat models,
assumptions, and the related security guarantees, when using
searchable encryption in the real-world settings; and 3) latest
efforts in building full-fledged encrypted database systems that
draw insights from searchable encryption constructions. The book
fits in the timely context, where the necessity of safeguarding
important and sensitive data has been globally recognized.
Traditional security measures, such as storing data behind network
firewalls and layers of access control mechanisms to keep attackers
out, are no longer sufficient to cope with the expanding landscape
of surging cyber threats. There is an urgent call to keep sensitive
data always encrypted to protect the data at rest, in transit, and
in use. Doing so guarantees data confidentiality for owners, even
if the data is out of their hands, e.g., hosted at in-the-cloud
databases. The daunting challenge is how to perform computation
over encrypted data. As we unfold in this book, searchable
encryption, as a specific line of research in this broadly defined
area, has received tremendous advancements over the past decades.
This book is majorly oriented toward senior undergraduates,
graduate students, and researchers, who want to work in the field
and need extensive coverage of encrypted database research. It also
targets security practitioners who want to make well-informed
deployment choices of the latest advancements in searchable
encryption for their targeted applications. Hopefully, this book
will be beneficial in both regards.
|
Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings (Paperback, 1st ed. 2018)
Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
|
R1,486
Discovery Miles 14 860
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of two workshops
held at the 13th International Conference on Security and Privacy
in Communications Networks, SecureComm 2017, held in Niagara Falls,
ON, Canada, in October 2017: the 5th International Workshop on
Applications and Techniques in Cyber Security, ATCS 2017, and the
First Workshop on Security and Privacy in the Internet Of Things,
SePrIoT 2017.The 22 revised regular papers were carefully reviewed
and selected from 105 submissions. The topics range from access
control; language-based security; malicious software; network
security; cloud security; software security; operating system
security; privacy protection, database security, security models;
and many more.The SePrIoT workshop targets to address novel
approaches in security and privacy. The papers focuse, amongst
others, on novel models, techniques, protocols, algorithms, or
architectures.
|
Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings (Paperback, 1st ed. 2018)
Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
|
R3,749
Discovery Miles 37 490
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed roceedings of the
13th International Conference on Security and Privacy in
Communications Networks, SecureComm 2017, held in Niagara Falls,
ON, Canada, in October 2017.The 31 revised regular papers and 15
short papers were carefully reviewed and selected from 105
submissions. The topics range from security and privacy in machine
learning to differential privacy, which are currently hot research
topics in cyber security research.
|
Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings (Paperback, 1st ed. 2017)
Robert Deng, Jian Weng, Kui Ren, Vinod Yegneswaran
|
R1,617
Discovery Miles 16 170
|
Ships in 10 - 15 working days
|
This book constitutes the refereed conference proceedings of the
12th International Conference on Security and Privacy in
Communications Networks, SecureComm 2016, held in Guangzhou, China,
in October 2016. The 32 revised full papers and 18 poster papers
were carefully reviewed and selected from 137 submissions. The
papers are organized thematically starting with mobile and network
security, followed by applied cryptography, web security and
privacy, system security, hardware security. The volume also
includes papers from the ATCS workshop and the poster session.
|
Wireless Algorithms, Systems, and Applications - 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings (Paperback, 2013 ed.)
Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, …
|
R1,544
Discovery Miles 15 440
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 8th
International Conference on Wireless Algorithms, Systems, and
Applications, WASA 2013, held in Zhangjiajie, China, in August
2013. The 25 revised full papers presented together with 18 invited
papers were carefully reviewed and selected from 80 submissions.
The papers cover the following topics: effective and efficient
state-of-the-art algorithm design and analysis, reliable and secure
system development and implementations, experimental study and
testbed validation, and new application exploration in wireless
networks.
A wireless sensor network (WSN) usually consists of a large number
of small, low-cost devices that have limited energy supply,
computation, memory, and communication capacities. Recently, WSNs
have drawn a lot of attention due to their broad applications in
both military and civilian domains. Communication security is
essential to the success of WSN applications, especially for those
mission-critical applications working in unattended and even
hostile environments. However, providing satisfactory security
protection in WSNs has ever been a challenging task due to various
network & resource constraints and malicious attacks. This
motivates extensive research on communication security for WSNs.
This book studies communication security in WSNs regarding three
important aspects, namely, broadcast/multicast security, data
report security, and random key pre-distribution. The latest
research results on these topics are discussed in detail. The book
will be of interest to researchers in the area of network security
and wireless networks. It is also directed towards senior
undergraduate and graduate students major in computer networks and
information security.
|
You may like...
Spaceboy
David Walliams
Paperback
R464
Discovery Miles 4 640
|