Security and Privacy in Mobile Social Networks

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Liang, Xiaohui (Συγγραφέας), Lu, Rongxing (Συγγραφέας), Lin, Xiaodong (Συγγραφέας), Shen, Xuemin (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New York, NY : Springer New York : Imprint: Springer, 2013.
Σειρά:SpringerBriefs in Computer Science,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03636nam a22005535i 4500
001 978-1-4614-8857-6
003 DE-He213
005 20151204175826.0
007 cr nn 008mamaa
008 131012s2013 xxu| s |||| 0|eng d
020 |a 9781461488576  |9 978-1-4614-8857-6 
024 7 |a 10.1007/978-1-4614-8857-6  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 |a Liang, Xiaohui.  |e author. 
245 1 0 |a Security and Privacy in Mobile Social Networks  |h [electronic resource] /  |c by Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2013. 
300 |a VIII, 100 p. 27 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a SpringerBriefs in Computer Science,  |x 2191-5768 
505 0 |a Overview -- Profile Matching Protocol with Anonymity Enhancing Techniques -- Cooperative Data Forwarding Strategy with Privacy Preservation -- Recommendation-based Trustworthy Service Evaluation. 
520 |a This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Computers. 
650 0 |a Electrical engineering. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Information Systems and Communication Service. 
700 1 |a Lu, Rongxing.  |e author. 
700 1 |a Lin, Xiaodong.  |e author. 
700 1 |a Shen, Xuemin.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781461488569 
830 0 |a SpringerBriefs in Computer Science,  |x 2191-5768 
856 4 0 |u http://dx.doi.org/10.1007/978-1-4614-8857-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)