|
|
|
|
LEADER |
04508nma a2201297 u 4500 |
001 |
EB002143806 |
003 |
EBX01000000000000001281932 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
230202 ||| eng |
020 |
|
|
|a books978-3-0365-5295-8
|
020 |
|
|
|a 9783036552958
|
020 |
|
|
|a 9783036552965
|
100 |
1 |
|
|a Lax, Gianluca
|
245 |
0 |
0 |
|a Advances in Information Security and Privacy
|h Elektronische Ressource
|
260 |
|
|
|a Basel
|b MDPI - Multidisciplinary Digital Publishing Institute
|c 2022
|
300 |
|
|
|a 1 electronic resource (344 p.)
|
653 |
|
|
|a password strength
|
653 |
|
|
|a privacy act
|
653 |
|
|
|a confidentiality
|
653 |
|
|
|a inner product encryption
|
653 |
|
|
|a COVID-19 pandemic
|
653 |
|
|
|a proof of stake
|
653 |
|
|
|a predictive analytics
|
653 |
|
|
|a constant-size ciphertext
|
653 |
|
|
|a Internet of vehicles (IoV)
|
653 |
|
|
|a online privacy invasions
|
653 |
|
|
|a n/a
|
653 |
|
|
|a integrity
|
653 |
|
|
|a cryptography
|
653 |
|
|
|a privacy
|
653 |
|
|
|a data security
|
653 |
|
|
|a password score
|
653 |
|
|
|a security model
|
653 |
|
|
|a contact tracing
|
653 |
|
|
|a Markov models
|
653 |
|
|
|a proof of work
|
653 |
|
|
|a anonymous communication systems
|
653 |
|
|
|a statistical characteristics
|
653 |
|
|
|a privacy attributes
|
653 |
|
|
|a network
|
653 |
|
|
|a personal data
|
653 |
|
|
|a personal information infringements
|
653 |
|
|
|a password analysis
|
653 |
|
|
|a blockchain privacy
|
653 |
|
|
|a unsign-cryption
|
653 |
|
|
|a pseudorandom sequences
|
653 |
|
|
|a GDPR
|
653 |
|
|
|a application security
|
653 |
|
|
|a non-repudiation
|
653 |
|
|
|a information security
|
653 |
|
|
|a cryptography module
|
653 |
|
|
|a security evaluation
|
653 |
|
|
|a decentralized inner product encryption
|
653 |
|
|
|a database with the universal basis of relations
|
653 |
|
|
|a consensus algorithm
|
653 |
|
|
|a Internet of Things
|
653 |
|
|
|a Information technology industries / bicssc
|
653 |
|
|
|a Clark-Wilson model
|
653 |
|
|
|a scalability
|
653 |
|
|
|a notarization
|
653 |
|
|
|a censorship resistance
|
653 |
|
|
|a secure cloud infrastructure
|
653 |
|
|
|a smart contracts
|
653 |
|
|
|a predicting judgments
|
653 |
|
|
|a mobile application
|
653 |
|
|
|a security
|
653 |
|
|
|a latency
|
653 |
|
|
|a delegation
|
653 |
|
|
|a stellar consensus protocol
|
653 |
|
|
|a IoV
|
653 |
|
|
|a effective distance
|
653 |
|
|
|a location privacy
|
653 |
|
|
|a authentication
|
653 |
|
|
|a network security
|
653 |
|
|
|a privacy precision
|
653 |
|
|
|a security measure
|
653 |
|
|
|a location-based services (LBS)
|
653 |
|
|
|a blockchain
|
653 |
|
|
|a host security
|
653 |
|
|
|a dummy location
|
653 |
|
|
|a Tor
|
653 |
|
|
|a cloud computing
|
653 |
|
|
|a passwords
|
653 |
|
|
|a heterogeneity
|
653 |
|
|
|a additive Fibonacci generator
|
653 |
|
|
|a privacy risks
|
653 |
|
|
|a data privacy
|
653 |
|
|
|a IoT device
|
653 |
|
|
|a privacy preservation
|
653 |
|
|
|a sign-cryption
|
653 |
|
|
|a Onion
|
653 |
|
|
|a cybersecurity
|
653 |
|
|
|a database
|
653 |
|
|
|a network text analysis
|
653 |
|
|
|a anonymity
|
653 |
|
|
|a European Union
|
700 |
1 |
|
|a Russo, Antonia
|
700 |
1 |
|
|a Lax, Gianluca
|
700 |
1 |
|
|a Russo, Antonia
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b DOAB
|a Directory of Open Access Books
|
500 |
|
|
|a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/
|
028 |
5 |
0 |
|a 10.3390/books978-3-0365-5295-8
|
856 |
4 |
2 |
|u https://directory.doabooks.org/handle/20.500.12854/93786
|z DOAB: description of the publication
|
856 |
4 |
0 |
|u https://www.mdpi.com/books/pdfview/book/6214
|7 0
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 000
|
082 |
0 |
|
|a 380
|
082 |
0 |
|
|a 700
|
082 |
0 |
|
|a 600
|
520 |
|
|
|a With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue.
|