000 03637nam a22005655i 4500
001 978-1-4614-8857-6
003 DE-He213
005 20200420220225.0
007 cr nn 008mamaa
008 131012s2013 xxu| s |||| 0|eng d
020 _a9781461488576
_9978-1-4614-8857-6
024 7 _a10.1007/978-1-4614-8857-6
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aLiang, Xiaohui.
_eauthor.
245 1 0 _aSecurity and Privacy in Mobile Social Networks
_h[electronic resource] /
_cby Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2013.
300 _aVIII, 100 p. 27 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5768
505 0 _aOverview -- Profile Matching Protocol with Anonymity Enhancing Techniques -- Cooperative Data Forwarding Strategy with Privacy Preservation -- Recommendation-based Trustworthy Service Evaluation.
520 _aThis book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aComputers.
650 0 _aElectrical engineering.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aSystems and Data Security.
650 2 4 _aInformation Systems and Communication Service.
700 1 _aLu, Rongxing.
_eauthor.
700 1 _aLin, Xiaodong.
_eauthor.
700 1 _aShen, Xuemin.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781461488569
830 0 _aSpringerBriefs in Computer Science,
_x2191-5768
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4614-8857-6
912 _aZDB-2-SCS
942 _cEBK
999 _c52164
_d52164