Advances in Information Security and Privacy
With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant...
Saved in:
Other Authors: | , |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2022
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_93786 | ||
005 | 20221117 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20221117s2022 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-0365-5295-8 | ||
020 | |a 9783036552958 | ||
020 | |a 9783036552965 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-0365-5295-8 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KNTX |2 bicssc | |
100 | 1 | |a Lax, Gianluca |4 edt | |
700 | 1 | |a Russo, Antonia |4 edt | |
700 | 1 | |a Lax, Gianluca |4 oth | |
700 | 1 | |a Russo, Antonia |4 oth | |
245 | 1 | 0 | |a Advances in Information Security and Privacy |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2022 | ||
300 | |a 1 electronic resource (344 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Information technology industries |2 bicssc | |
653 | |a privacy preservation | ||
653 | |a Internet of vehicles (IoV) | ||
653 | |a location-based services (LBS) | ||
653 | |a location privacy | ||
653 | |a dummy location | ||
653 | |a effective distance | ||
653 | |a anonymity | ||
653 | |a confidentiality | ||
653 | |a blockchain privacy | ||
653 | |a privacy precision | ||
653 | |a smart contracts | ||
653 | |a cryptography | ||
653 | |a privacy attributes | ||
653 | |a privacy risks | ||
653 | |a integrity | ||
653 | |a database | ||
653 | |a database with the universal basis of relations | ||
653 | |a Clark-Wilson model | ||
653 | |a cloud computing | ||
653 | |a secure cloud infrastructure | ||
653 | |a application security | ||
653 | |a network security | ||
653 | |a host security | ||
653 | |a data security | ||
653 | |a Markov models | ||
653 | |a passwords | ||
653 | |a password analysis | ||
653 | |a password strength | ||
653 | |a password score | ||
653 | |a contact tracing | ||
653 | |a COVID-19 pandemic | ||
653 | |a security | ||
653 | |a privacy | ||
653 | |a mobile application | ||
653 | |a GDPR | ||
653 | |a personal data | ||
653 | |a delegation | ||
653 | |a notarization | ||
653 | |a blockchain | ||
653 | |a non-repudiation | ||
653 | |a data privacy | ||
653 | |a heterogeneity | ||
653 | |a European Union | ||
653 | |a Internet of Things | ||
653 | |a consensus algorithm | ||
653 | |a proof of work | ||
653 | |a proof of stake | ||
653 | |a stellar consensus protocol | ||
653 | |a online privacy invasions | ||
653 | |a personal information infringements | ||
653 | |a predicting judgments | ||
653 | |a predictive analytics | ||
653 | |a privacy act | ||
653 | |a network text analysis | ||
653 | |a security model | ||
653 | |a security measure | ||
653 | |a security evaluation | ||
653 | |a anonymous communication systems | ||
653 | |a Tor | ||
653 | |a Onion | ||
653 | |a censorship resistance | ||
653 | |a sign-cryption | ||
653 | |a unsign-cryption | ||
653 | |a cryptography module | ||
653 | |a IoT device | ||
653 | |a IoV | ||
653 | |a authentication | ||
653 | |a network | ||
653 | |a latency | ||
653 | |a scalability | ||
653 | |a inner product encryption | ||
653 | |a decentralized inner product encryption | ||
653 | |a constant-size ciphertext | ||
653 | |a pseudorandom sequences | ||
653 | |a additive Fibonacci generator | ||
653 | |a statistical characteristics | ||
653 | |a cybersecurity | ||
653 | |a information security | ||
653 | |a n/a | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/6214 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/93786 |7 0 |z DOAB: description of the publication |