LEADER 00913oam 2200325zu 450 001 996198429903316 005 20210807001336.0 010 $a1-61284-798-6 035 $a(CKB)2670000000131595 035 $a(SSID)ssj0000669087 035 $a(PQKBManifestationID)12302093 035 $a(PQKBTitleCode)TC0000669087 035 $a(PQKBWorkID)10704233 035 $a(PQKB)10779839 035 $a(EXLCZ)992670000000131595 100 $a20160829d2011 uy 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 10$a2011 IEEE/AIAA 30th Digital Avionics Systems Conference 210 31$a[Place of publication not identified]$cIEEE$d2011 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-61284-797-8 702 $aIEEE Staff 801 0$bPQKB 906 $aPROCEEDING 912 $a996198429903316 996 $a2011 IEEE$92188595 997 $aUNISA LEADER 01391nas 2200469- 450 001 9910340608003321 005 20230522213016.0 035 $a(OCoLC)829117846 035 $a(CKB)3340000000000026 035 $a(CONSER)--2020204500 035 $a(DE-599)ZDB2646442-1 035 $a(MiAaPQ)4451110 035 $a(EXLCZ)993340000000000026 100 $a20120313a20109999 --- a 101 0 $aeng 135 $aurcn|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aJournal of experimental psychopathology 210 1$a[London, England] :$cTextrum Ltd.,$d2010- 210 31$a[London] :$cSAGE 215 $a1 online resource 225 0 $aHealth & Medical Collection. 225 0 $aProQuest Central. 225 0 $aSAGE Premier. 225 0 $aDirectory of Open Access Journals. 300 $aRefereed/Peer-reviewed 311 08$a2043-8087 517 1 $aJEP 531 0 $aJ. exp. psychopathol. 606 $aPsychology, Pathological$vPeriodicals 606 $aPsychology, Pathological$2fast$3(OCoLC)fst01081609 608 $aPeriodicals.$2fast 615 0$aPsychology, Pathological 615 7$aPsychology, Pathological. 676 $a616.89 686 $a44.91$2bcl 906 $aJOURNAL 912 $a9910340608003321 996 $aJournal of experimental psychopathology$92131791 997 $aUNINA LEADER 04459nam 22006495 450 001 9910483392303321 005 20251204105732.0 010 $a3-030-58896-3 024 7 $a10.1007/978-3-030-58896-0 035 $a(CKB)5410000000054458 035 $a(MiAaPQ)EBC6414297 035 $a(DE-He213)978-3-030-58896-0 035 $a(PPN)252510402 035 $a(EXLCZ)995410000000054458 100 $a20201128d2021 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAlgorithms for Data and Computation Privacy /$fby Alex X. Liu, Rui Li 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (XVIII, 404 p. 163 illus., 130 illus. in color.) 311 08$a3-030-58895-5 327 $aPart I Privacy Preserving Queries -- Range Queries over Encrypted Data -- Fast and Scalable Range and Keyword Query Processing over Encrypted Data with Provable Adaptive Security -- Nearest Neighbor Queries over Encrypted Data -- K-nearest Neighbor Queries over Encrypted Data -- Top-k Queries for Two-tiered Sensor Networks -- Part II Privacy Preserving Computation -- Collaborative Enforcement of Firewall Policies in Virtual Private Networks -- Privacy Preserving Quantification of Cross-Domain Network Reachability -- Cross-Domain Privacy-Preserving Cooperative Firewall Optimization -- Privacy Preserving String Matching for Cloud Computing -- Privacy Preserving Information Hub Identification in Social Networks -- Part III Differential Privacy -- Publishing Social Network Data with Privacy Guarantees -- Predictable Privacy-Preserving Mobile Crowd Sensing -- Differentially Private and Budget Limited Bandit Learning over Matroids -- Part IV Breaking Privacy -- Breaching Privacy in Encrypted Instant Messaging Networks. 330 $aThis book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook?Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text. 606 $aData protection$xLaw and legislation 606 $aComputer networks 606 $aInformation storage and retrieval systems 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aPrivacy 606 $aComputer Communication Networks 606 $aInformation Storage and Retrieval 606 $aMobile and Network Security 606 $aData and Information Security 615 0$aData protection$xLaw and legislation. 615 0$aComputer networks. 615 0$aInformation storage and retrieval systems. 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 14$aPrivacy. 615 24$aComputer Communication Networks. 615 24$aInformation Storage and Retrieval. 615 24$aMobile and Network Security. 615 24$aData and Information Security. 676 $a005.8 700 $aLiu$b Alex X.$01099803 702 $aLi$b Rui 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483392303321 996 $aAlgorithms for data and computation privacy$92814026 997 $aUNINA