Advances in Information Security and Privacy / / Gianluca Lax and Antonia Russo.
With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant...
Saved in:
VerfasserIn: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Basel, Switzerland : : MDPI - Multidisciplinary Digital Publishing Institute,, 2022. |
Year of Publication: | 2022 |
Language: | English |
Physical Description: | 1 online resource (344 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993603800004498 |
---|---|
ctrlnum |
(CKB)5700000000300382 (NjHacI)995700000000300382 (EXLCZ)995700000000300382 |
collection |
bib_alma |
record_format |
marc |
spelling |
Lax, Gianluca, author. Advances in Information Security and Privacy / Gianluca Lax and Antonia Russo. Basel, Switzerland : MDPI - Multidisciplinary Digital Publishing Institute, 2022. 1 online resource (344 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on publisher supplied metadata and other sources. With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue. About the Editors -- Advances in Information Security and Privacy -- Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges -- Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges -- Decentralized Inner-Product Encryption with Constant-Size Ciphertext -- A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network -- Development of Additive Fibonacci Generators with Improved Characteristics for Cybersecurity Needs -- CBCIoT: A Consensus Algorithm for Blockchain-Based IoT Applications -- A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles -- Contact Tracing: Ensuring Privacy and Security -- AI Model for Predicting Legal Judgments to Improve Accuracy and -- Explainability of Online Privacy Invasion Cases -- Achieving Sender Anonymity in Tor against the Global Passive Adversary -- A Blockchain-Based Efficient, Secure and Anonymous Conditional -- Privacy-Preserving and Authentication Scheme for the Internet of Vehicles -- Strength Analysis of Real-Life Passwords Using Markov Models -- Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements-Hoffman Model -- Ensuring Data Integrity in Databases with the Universal Basis of Relations -- Delegation-Based Personal Data Processing Request Notarization -- Framework for GDPR Based on Private Blockchain -- Data Protection Heterogeneity in the European Union. Information technology. Data protection. 3-0365-5296-0 Russo, Antonia, author. |
language |
English |
format |
eBook |
author |
Lax, Gianluca, Russo, Antonia, |
spellingShingle |
Lax, Gianluca, Russo, Antonia, Advances in Information Security and Privacy / About the Editors -- Advances in Information Security and Privacy -- Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges -- Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges -- Decentralized Inner-Product Encryption with Constant-Size Ciphertext -- A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network -- Development of Additive Fibonacci Generators with Improved Characteristics for Cybersecurity Needs -- CBCIoT: A Consensus Algorithm for Blockchain-Based IoT Applications -- A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles -- Contact Tracing: Ensuring Privacy and Security -- AI Model for Predicting Legal Judgments to Improve Accuracy and -- Explainability of Online Privacy Invasion Cases -- Achieving Sender Anonymity in Tor against the Global Passive Adversary -- A Blockchain-Based Efficient, Secure and Anonymous Conditional -- Privacy-Preserving and Authentication Scheme for the Internet of Vehicles -- Strength Analysis of Real-Life Passwords Using Markov Models -- Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements-Hoffman Model -- Ensuring Data Integrity in Databases with the Universal Basis of Relations -- Delegation-Based Personal Data Processing Request Notarization -- Framework for GDPR Based on Private Blockchain -- Data Protection Heterogeneity in the European Union. |
author_facet |
Lax, Gianluca, Russo, Antonia, Russo, Antonia, |
author_variant |
g l gl a r ar |
author_role |
VerfasserIn VerfasserIn |
author2 |
Russo, Antonia, |
author2_role |
TeilnehmendeR |
author_sort |
Lax, Gianluca, |
title |
Advances in Information Security and Privacy / |
title_full |
Advances in Information Security and Privacy / Gianluca Lax and Antonia Russo. |
title_fullStr |
Advances in Information Security and Privacy / Gianluca Lax and Antonia Russo. |
title_full_unstemmed |
Advances in Information Security and Privacy / Gianluca Lax and Antonia Russo. |
title_auth |
Advances in Information Security and Privacy / |
title_new |
Advances in Information Security and Privacy / |
title_sort |
advances in information security and privacy / |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute, |
publishDate |
2022 |
physical |
1 online resource (344 pages) |
contents |
About the Editors -- Advances in Information Security and Privacy -- Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges -- Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges -- Decentralized Inner-Product Encryption with Constant-Size Ciphertext -- A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network -- Development of Additive Fibonacci Generators with Improved Characteristics for Cybersecurity Needs -- CBCIoT: A Consensus Algorithm for Blockchain-Based IoT Applications -- A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles -- Contact Tracing: Ensuring Privacy and Security -- AI Model for Predicting Legal Judgments to Improve Accuracy and -- Explainability of Online Privacy Invasion Cases -- Achieving Sender Anonymity in Tor against the Global Passive Adversary -- A Blockchain-Based Efficient, Secure and Anonymous Conditional -- Privacy-Preserving and Authentication Scheme for the Internet of Vehicles -- Strength Analysis of Real-Life Passwords Using Markov Models -- Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements-Hoffman Model -- Ensuring Data Integrity in Databases with the Universal Basis of Relations -- Delegation-Based Personal Data Processing Request Notarization -- Framework for GDPR Based on Private Blockchain -- Data Protection Heterogeneity in the European Union. |
isbn |
3-0365-5296-0 |
callnumber-first |
T - Technology |
callnumber-subject |
T - General Technology |
callnumber-label |
T58 |
callnumber-sort |
T 258.5 L394 42022 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
004 - Data processing & computer science |
dewey-full |
004 |
dewey-sort |
14 |
dewey-raw |
004 |
dewey-search |
004 |
work_keys_str_mv |
AT laxgianluca advancesininformationsecurityandprivacy AT russoantonia advancesininformationsecurityandprivacy |
status_str |
n |
ids_txt_mv |
(CKB)5700000000300382 (NjHacI)995700000000300382 (EXLCZ)995700000000300382 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Advances in Information Security and Privacy / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1796653251021504512 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03173nam a2200313 i 4500</leader><controlfield tag="001">993603800004498</controlfield><controlfield tag="005">20230702113008.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230702s2022 sz o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5700000000300382</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995700000000300382</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995700000000300382</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T58.5</subfield><subfield code="b">.L394 2022</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lax, Gianluca,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in Information Security and Privacy /</subfield><subfield code="c">Gianluca Lax and Antonia Russo.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Basel, Switzerland :</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (344 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">About the Editors -- Advances in Information Security and Privacy -- Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges -- Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges -- Decentralized Inner-Product Encryption with Constant-Size Ciphertext -- A Practical and Efficient Node Blind SignCryption Scheme for the IoT Device Network -- Development of Additive Fibonacci Generators with Improved Characteristics for Cybersecurity Needs -- CBCIoT: A Consensus Algorithm for Blockchain-Based IoT Applications -- A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles -- Contact Tracing: Ensuring Privacy and Security -- AI Model for Predicting Legal Judgments to Improve Accuracy and -- Explainability of Online Privacy Invasion Cases -- Achieving Sender Anonymity in Tor against the Global Passive Adversary -- A Blockchain-Based Efficient, Secure and Anonymous Conditional -- Privacy-Preserving and Authentication Scheme for the Internet of Vehicles -- Strength Analysis of Real-Life Passwords Using Markov Models -- Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements-Hoffman Model -- Ensuring Data Integrity in Databases with the Universal Basis of Relations -- Delegation-Based Personal Data Processing Request Notarization -- Framework for GDPR Based on Private Blockchain -- Data Protection Heterogeneity in the European Union.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-5296-0</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russo, Antonia,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-08 12:13:39 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-11-14 04:01:55 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5341095530004498&Force_direct=true</subfield><subfield code="Z">5341095530004498</subfield><subfield code="b">Available</subfield><subfield code="8">5341095530004498</subfield></datafield></record></collection> |