Preserving Privacy Against Side-Channel Leaks (Record no. 59184)

000 -LEADER
fixed length control field 03338nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-319-42644-0
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112556.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160824s2016 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319426440
-- 978-3-319-42644-0
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Liu, Wen Ming.
245 10 - TITLE STATEMENT
Title Preserving Privacy Against Side-Channel Leaks
Sub Title From Data Publishing to Web Applications /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIII, 142 p. 19 illus., 1 illus. in color.
490 1# - SERIES STATEMENT
Series statement Advances in Information Security,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Related Work -- Data Publishing: Trading off Privacy with Utility through the k-Jump Strategy -- Data Publishing: A Two-Stage Approach to Improving Algorithm Efficiency -- Web Applications: k-Indistinguishable Traffic Padding -- Web Applications: Background-Knowledge Resistant Random Padding -- Smart Metering: Inferences of Appliance Status from Fine-Grained Readings -- The Big Picture: A Generic Model of Side-Channel Leaks -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee. Finally, the book considers privacy-preserving smart metering by proposing a light-weight approach to simultaneously preserving users' privacy and ensuring billing accuracy. Designed for researchers and professionals, this book is also suitable for advanced-level students interested in privacy, algorithms, or web applications.
700 1# - AUTHOR 2
Author 2 Wang, Lingyu.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-42644-0
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer communication systems.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems and Communication Service.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1568-2633 ;
912 ## -
-- ZDB-2-SCS

No items available.