Advances in Information Security and Privacy

With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant...

Full description

Bibliographic Details
Main Author: Lax, Gianluca
Other Authors: Russo, Antonia
Format: eBook
Language:English
Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2022
Subjects:
N/a
Iov
Tor
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
LEADER 04508nma a2201297 u 4500
001 EB002143806
003 EBX01000000000000001281932
005 00000000000000.0
007 cr|||||||||||||||||||||
008 230202 ||| eng
020 |a books978-3-0365-5295-8 
020 |a 9783036552958 
020 |a 9783036552965 
100 1 |a Lax, Gianluca 
245 0 0 |a Advances in Information Security and Privacy  |h Elektronische Ressource 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2022 
300 |a 1 electronic resource (344 p.) 
653 |a password strength 
653 |a privacy act 
653 |a confidentiality 
653 |a inner product encryption 
653 |a COVID-19 pandemic 
653 |a proof of stake 
653 |a predictive analytics 
653 |a constant-size ciphertext 
653 |a Internet of vehicles (IoV) 
653 |a online privacy invasions 
653 |a n/a 
653 |a integrity 
653 |a cryptography 
653 |a privacy 
653 |a data security 
653 |a password score 
653 |a security model 
653 |a contact tracing 
653 |a Markov models 
653 |a proof of work 
653 |a anonymous communication systems 
653 |a statistical characteristics 
653 |a privacy attributes 
653 |a network 
653 |a personal data 
653 |a personal information infringements 
653 |a password analysis 
653 |a blockchain privacy 
653 |a unsign-cryption 
653 |a pseudorandom sequences 
653 |a GDPR 
653 |a application security 
653 |a non-repudiation 
653 |a information security 
653 |a cryptography module 
653 |a security evaluation 
653 |a decentralized inner product encryption 
653 |a database with the universal basis of relations 
653 |a consensus algorithm 
653 |a Internet of Things 
653 |a Information technology industries / bicssc 
653 |a Clark-Wilson model 
653 |a scalability 
653 |a notarization 
653 |a censorship resistance 
653 |a secure cloud infrastructure 
653 |a smart contracts 
653 |a predicting judgments 
653 |a mobile application 
653 |a security 
653 |a latency 
653 |a delegation 
653 |a stellar consensus protocol 
653 |a IoV 
653 |a effective distance 
653 |a location privacy 
653 |a authentication 
653 |a network security 
653 |a privacy precision 
653 |a security measure 
653 |a location-based services (LBS) 
653 |a blockchain 
653 |a host security 
653 |a dummy location 
653 |a Tor 
653 |a cloud computing 
653 |a passwords 
653 |a heterogeneity 
653 |a additive Fibonacci generator 
653 |a privacy risks 
653 |a data privacy 
653 |a IoT device 
653 |a privacy preservation 
653 |a sign-cryption 
653 |a Onion 
653 |a cybersecurity 
653 |a database 
653 |a network text analysis 
653 |a anonymity 
653 |a European Union 
700 1 |a Russo, Antonia 
700 1 |a Lax, Gianluca 
700 1 |a Russo, Antonia 
041 0 7 |a eng  |2 ISO 639-2 
989 |b DOAB  |a Directory of Open Access Books 
500 |a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/ 
028 5 0 |a 10.3390/books978-3-0365-5295-8 
856 4 2 |u https://directory.doabooks.org/handle/20.500.12854/93786  |z DOAB: description of the publication 
856 4 0 |u https://www.mdpi.com/books/pdfview/book/6214  |7 0  |x Verlag  |3 Volltext 
082 0 |a 000 
082 0 |a 380 
082 0 |a 700 
082 0 |a 600 
520 |a With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue.