Explore
Advances in Information Security and Privacy
0 Ungluers have
Faved this Work
Login to Fave
With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 57 times via unglue.it ebook links.
- 57 - pdf (CC BY) at Unglue.it.
Keywords
- additive Fibonacci generator
- anonymity
- anonymous communication systems
- application security
- authentication
- blockchain
- blockchain privacy
- censorship resistance
- ClarkâWilson model
- Cloud computing
- confidentiality
- consensus algorithm
- constant-size ciphertext
- contact tracing
- COVID-19 Pandemic
- Cryptography
- cryptography module
- cybersecurity
- data privacy
- data security
- Database
- database with the universal basis of relations
- decentralized inner product encryption
- Delegation
- dummy location
- Economics, finance, business & management
- effective distance
- European Union
- GDPR
- heterogeneity
- host security
- Industry & industrial studies
- Information Security
- Information technology industries
- inner product encryption
- integrity
- Internet of Things
- Internet of vehicles (IoV)
- IoT device
- IoV
- latency
- location privacy
- location-based services (LBS)
- Markov models
- Media, information & communication industries
- mobile application
- n/a
- network
- network security
- network text analysis
- non-repudiation
- notarization
- onion
- online privacy invasions
- password analysis
- password score
- password strength
- Passwords
- personal data
- personal information infringements
- predicting judgments
- Predictive analytics
- privacy
- privacy act
- privacy attributes
- privacy precision
- privacy preservation
- privacy risks
- proof of stake
- proof of work
- pseudorandom sequences
- Scalability
- secure cloud infrastructure
- security
- security evaluation
- security measure
- security model
- sign-cryption
- Smart Contracts
- statistical characteristics
- stellar consensus protocol
- Tor
- unsign-cryption