Advances in Information Security and Privacy

With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant...

Full description

Saved in:
Bibliographic Details
Other Authors: Lax, Gianluca (Editor), Russo, Antonia (Editor)
Format: Electronic Book Chapter
Language:English
Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2022
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_93786
005 20221117
003 oapen
006 m o d
007 cr|mn|---annan
008 20221117s2022 xx |||||o ||| 0|eng d
020 |a books978-3-0365-5295-8 
020 |a 9783036552958 
020 |a 9783036552965 
040 |a oapen  |c oapen 
024 7 |a 10.3390/books978-3-0365-5295-8  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a KNTX  |2 bicssc 
100 1 |a Lax, Gianluca  |4 edt 
700 1 |a Russo, Antonia  |4 edt 
700 1 |a Lax, Gianluca  |4 oth 
700 1 |a Russo, Antonia  |4 oth 
245 1 0 |a Advances in Information Security and Privacy 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2022 
300 |a 1 electronic resource (344 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Information technology industries  |2 bicssc 
653 |a privacy preservation 
653 |a Internet of vehicles (IoV) 
653 |a location-based services (LBS) 
653 |a location privacy 
653 |a dummy location 
653 |a effective distance 
653 |a anonymity 
653 |a confidentiality 
653 |a blockchain privacy 
653 |a privacy precision 
653 |a smart contracts 
653 |a cryptography 
653 |a privacy attributes 
653 |a privacy risks 
653 |a integrity 
653 |a database 
653 |a database with the universal basis of relations 
653 |a Clark-Wilson model 
653 |a cloud computing 
653 |a secure cloud infrastructure 
653 |a application security 
653 |a network security 
653 |a host security 
653 |a data security 
653 |a Markov models 
653 |a passwords 
653 |a password analysis 
653 |a password strength 
653 |a password score 
653 |a contact tracing 
653 |a COVID-19 pandemic 
653 |a security 
653 |a privacy 
653 |a mobile application 
653 |a GDPR 
653 |a personal data 
653 |a delegation 
653 |a notarization 
653 |a blockchain 
653 |a non-repudiation 
653 |a data privacy 
653 |a heterogeneity 
653 |a European Union 
653 |a Internet of Things 
653 |a consensus algorithm 
653 |a proof of work 
653 |a proof of stake 
653 |a stellar consensus protocol 
653 |a online privacy invasions 
653 |a personal information infringements 
653 |a predicting judgments 
653 |a predictive analytics 
653 |a privacy act 
653 |a network text analysis 
653 |a security model 
653 |a security measure 
653 |a security evaluation 
653 |a anonymous communication systems 
653 |a Tor 
653 |a Onion 
653 |a censorship resistance 
653 |a sign-cryption 
653 |a unsign-cryption 
653 |a cryptography module 
653 |a IoT device 
653 |a IoV 
653 |a authentication 
653 |a network 
653 |a latency 
653 |a scalability 
653 |a inner product encryption 
653 |a decentralized inner product encryption 
653 |a constant-size ciphertext 
653 |a pseudorandom sequences 
653 |a additive Fibonacci generator 
653 |a statistical characteristics 
653 |a cybersecurity 
653 |a information security 
653 |a n/a 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/6214  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/93786  |7 0  |z DOAB: description of the publication