LEADER 02758nam 22007331 450 001 9910454193503321 005 20210819064134.0 010 $a1-4725-5001-3 010 $a1-282-01297-5 010 $a978-1-4725-5001-9$b(online) 010 $z978-0-5672-9299-5$b(paperback) 010 $a9786612012976 010 $a0-567-27778-X 024 7 $a10.5040/9781472550019 035 $a(CKB)1000000000722312 035 $a(EBL)436728 035 $a(OCoLC)318130102 035 $a(SSID)ssj0000240397 035 $a(PQKBManifestationID)12022630 035 $a(PQKBTitleCode)TC0000240397 035 $a(PQKBWorkID)10271721 035 $a(PQKB)11590848 035 $a(MiAaPQ)EBC436728 035 $a(Au-PeEL)EBL436728 035 $a(CaPaEBR)ebr10285149 035 $a(CaONFJC)MIL201297 035 $a(OCoLC)893334398 035 $a(OCoLC)646806790 035 $a(UtOrBLW)bpp09256981 035 $a(EXLCZ)991000000000722312 100 $a20140929d1995 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSacrament of salvation $ean introduction to Eucharistic ecclesiology /$fPaul McPartlan 210 1$aEdinburgh :$cT&T Clark,$d1995. 215 $a1 online resource (145 pages) 300 $aIncludes index 311 0 $a0-567-29299-1 320 $aIncludes bibliographical references and index. 327 $aContents -- Abbreviations -- Introduction -- 1: The Eucharist Makes the Church -- 2: Preparation of the Children of Abraham -- 3: The Story of the New People of God -- 4: 'A Modern Father of the Church' -- 5: The Church, Sacrament of Salvation -- 6: The Holy Spirit and Unity -- 7: 'This Is the Cup of My Blood' -- 8: 'The Universe Attains Its Destiny through Us' -- Index of Names 330 $a"For all who wish to develop a eucharistic understanding of the Church and its application to issues of current debate."--Bloomsbury Publishing 330 8 $aFor all who wish to develop a eucharistic understanding of the Church and its application to issues of current debate 606 $aLord's supper$xCatholic Church 606 $2Christian theology 606 $aLord's supper$xReal presence 606 $aChristian union 608 $aElectronic books. 615 0$aLord's supper$xCatholic Church. 615 0$aLord's supper$xReal presence. 615 0$aChristian union. 676 $a234.163 676 $a262.009 700 $aMcPartland$b Paul$01028285 801 0$bUtOrBLW 801 1$bUtOrBLW 801 2$bUkLoBP 801 2$bNACU:E 906 $aBOOK 912 $a9910454193503321 996 $aSacrament of salvation$92444236 997 $aUNINA LEADER 06822nam 22006135 450 001 9911047817803321 005 20250722130257.0 010 $a3-031-95052-6 024 7 $a10.1007/978-3-031-95052-0 035 $a(CKB)39698541100041 035 $a(MiAaPQ)EBC32227309 035 $a(Au-PeEL)EBL32227309 035 $a(DE-He213)978-3-031-95052-0 035 $a(EXLCZ)9939698541100041 100 $a20250722d2026 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPerturbation Based Privacy in Crowdsensing /$fby Zhirun Zheng, Zhetao Li, Xuemin Shen 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (264 pages) 225 1 $aWireless Networks,$x2366-1445 311 08$a3-031-95051-8 327 $aChapter 1 -- 1.1 An Overview of Crowdsensing -- 1.1.1 Evolutionary Path of Crowdsensing -- 1.1.2 Architecture and Characteristics of Crowdsensing -- 1.1.3 Applications of Crowdsensing -- 1.2 Privacy Challenges in Crowdsensing -- 1.2.1 Privacy Leakage -- 1.2.2 Data Privacy vs. Data Utility -- 1.2.3 Data Privacy vs. Data Poisoning -- 1.3 Aim and Organization of Monograph -- Chapter 2 Perturbation-based Privacy Preservation -- 2.1 Classical Privacy Notions -- 2.1.1 Differentially Privacy -- 2.1.2 Identifiability -- 2.1.3 Mutual-Information Privacy -- 2.2 Relations between Privacy Notions -- 2.2.1 Differentially Privacy vs. Identifiability -- 2.2.2 Differentially Privacy vs. Mutual-Information Privacy -- 2.2.3 Identifiability vs. Mutual-Information Privacy -- 2.3 Summary -- Chapter 3 Semantic-Aware Trajectory Privacy Preservation in Crowdsensing -- 3.1 Problem Statement and Basic Concepts -- 3.1.1 Problem Statement -- 3.1.2 Basic Concepts -- 3.2 Privacy and Utility Metrics -- 3.2.1 Data Privacy Metric -- 3.2.2 Semantic Privacy Metric -- 3.2.3 Semantic-Aware Trajectory Utility Metric -- 3.3 Semantic-Aware Privacy Mapping Mechanism -- 3.3.1 Constructing Optimization Model -- 3.3.2 Solving Optimization Model -- 3.3.3 Computational Complexity -- 3.4 Privacy Analysis -- 3.5 Performance Evaluation -- 3.5.1 Simulation Settings -- 3.5.2 Simulation Results -- 3.6 Summary and Further Reading -- Chapter 4 Pricing-Aware Location Privacy Preservation in Crowdsensing -- 4.1 Problem Statement and Basic Concepts -- 4.1.1 Problem Statement -- 4.1.2 Basic Concepts -- 4.2 Utility Loss Metrics 4 4.2.1 Adaptive Supply and Demand Aware Grid -- 4.2.2 Dynamic Pricing Utility Metric -- 4.2.3 Ride-Matching Utility Metric -- 4.3 Pricing-Aware Privacy Mapping Mechanism -- 4.3.1 Constructing Optimization Model -- 4.3.2 Solving Optimization Model -- 4.3.3 Computational Complexity -- 4.4 Privacy Analysis -- 4.5 Performance Evaluation -- 4.5.1 Simulation Settings -- 4.5.2 Simulation Results -- 4.6 Summary and Further Reading -- Chapter 5 Data Poisoning Attacks and Defenses to LDP-based Crowdsensing -- 5.1 Problem Statement and Basic Concepts -- 5.1.1 Problem Statement -- 5.1.2 Basic Concepts -- 5.2 Data Poisoning Attacks Hidden behind the LDP Noise -- 5.2.1 LDP-based Privacy-Preserving Truth Discovery Methods -- 5.2.2 Formulating Optimal Data Poisoning Attacks -- 5.2.3 Finding Optimal Data Poisoning Attacks -- 5.3 Countermeasures: Designing Optimal Defenses -- 5.3.1 Formulating Optimal Countermeasures -- 5.3.2 Finding Optimal Countermeasures -- 5.4 Computational Complexity and Limitations of Attacks and Defenses -- 5.4.1 Computational Complexity of Attacks and Defenses -- 5.4.2 Limitations of Attacks and Defenses -- 5.5 Performance Evaluation -- 5.5.1 Simulation Settings -- 5.5.2 Simulation Results -- 5.6 Summary and Further Reading -- Chapter 6 Data Poisoning Attacks and Defenses to CDP-based Crowdsensing -- 6.1 Problem Statement and Basic Concepts -- 6.1.1 Problem Statement -- 6.1.2 Basic Concepts -- 6.2 Formulating Game Model between Attacks and Defenses -- 6.2.1 Zero-Sum Stackelberg Game -- 6.2.2 Unveiling the Normal Behavior of Workers -- 6.3 Finding Optimal Data Poisoning Attacks and Defenses -- 6.3.1 Defense Strategy for Defenders -- 6.3.2 Attack Strategy for Attackers -- 6.3.3 Local Minimax Point of Defenders-Attackers Interaction -- 6.4 Computational Complexity and Limitations of Attacks and Defenses -- 6.4.1 Computational Complexity of Attacks and defenses -- 6.4.2 Limitations of Attacks and Defenses 5 6.5 Performance Evaluation -- 6.5.1 Simulation Settings -- 6.5.2 Simulation Results -- 6.6 Summary and Further Reading -- Chapter 7 Conclusion and Future Works -- 7.1 Conclusion -- 7.2 Future Works. 330 $aThis book investigates perturbation-based privacy in crowdsensing systems. The authors first present an explicit overview of crowdsensing systems and privacy challenges and briefly discuss how the noise added by perturbation-based privacy-preserving techniques could inevitably degrade data quality and facilitate the success of data poisoning attacks on crowdsensing. The authors then give a comprehensive review of classical privacy notions for perturbation-based privacy-preserving techniques and theoretically analyze the relations between these privacy notions. The next four chapters conduct a series of studies on privacy preservation in crowdsensing systems from three dimensions of data privacy, data utility and data poisoning. Finally, the book explores open issues and outlines future research directions for perturbation-based privacy preservation in crowdsensing systems. Advanced-level students majoring in the areas of network security, computer science and electrical engineering will find this book useful as a secondary text. Professionals seeking privacy-preserving solutions for crowdsensing systems will also find this book useful as a reference. 410 0$aWireless Networks,$x2366-1445 606 $aComputer networks 606 $aData protection$xLaw and legislation 606 $aWireless communication systems 606 $aMobile communication systems 606 $aComputer Communication Networks 606 $aPrivacy 606 $aWireless and Mobile Communication 615 0$aComputer networks. 615 0$aData protection$xLaw and legislation. 615 0$aWireless communication systems. 615 0$aMobile communication systems. 615 14$aComputer Communication Networks. 615 24$aPrivacy. 615 24$aWireless and Mobile Communication. 676 $a004.6 700 $aZheng$b Zhirun$01862370 701 $aLi$b Zhetao$01862371 701 $aShen$b Xuemin$01605727 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911047817803321 996 $aPerturbation Based Privacy in Crowdsensing$94468624 997 $aUNINA