LEADER 03761oam 2200613 450 001 9910437577703321 005 20190911103512.0 010 $a1-4614-8857-5 024 7 $a10.1007/978-1-4614-8857-6 035 $a(OCoLC)861338634 035 $a(MiFhGG)GVRL6WYG 035 $a(EXLCZ)993710000000024307 100 $a20130812d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity and privacy in mobile social networks /$fXiaohui Liang [and four others] 205 $a1st ed. 2013. 210 1$aNew York :$cSpringer,$d2013. 215 $a1 online resource (viii, 100 pages) $cillustrations (some color) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $a"ISSN: 2191-5768." 311 $a1-4614-8856-7 320 $aIncludes bibliographical references. 327 $aOverview -- Profile Matching Protocol with Anonymity Enhancing Techniques -- Cooperative Data Forwarding Strategy with Privacy Preservation -- Recommendation-based Trustworthy Service Evaluation. 330 $aThis book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014. 410 0$aSpringerBriefs in computer science. 606 $aComputer networks 606 $aComputer science 606 $aData protection 606 $aInformation storage and retrieval systems 606 $aTelecommunication 606 $aOnline social networks$xSecurity measures 606 $aMobile computing$xSecurity measures 615 0$aComputer networks. 615 0$aComputer science. 615 0$aData protection. 615 0$aInformation storage and retrieval systems. 615 0$aTelecommunication. 615 0$aOnline social networks$xSecurity measures. 615 0$aMobile computing$xSecurity measures. 676 $a004.6 700 $aLiang$b Xiaohui$4aut$4http://id.loc.gov/vocabulary/relators/aut$01062314 702 $aLu$b Rongxing$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aLin$b Xiaodong$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aShen$b Xuemin$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910437577703321 996 $aSecurity and Privacy in Mobile Social Networks$92524278 997 $aUNINA