


default search action
Synthesis Lectures on Information Security, Privacy, and Trust
2020
- Sourya Joyee De, Abdessamad Imine:

Privacy Risk Analysis of Online Social Networks. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2020, ISBN 978-3-031-01227-3
2017
- Danfeng (Daphne) Yao

, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo:
Anomaly Detection as a Service: Challenges, Advances, and Opportunities. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01226-6 - Bruce M. McMillin, Thomas P. Roth:

Cyber-Physical Security and Privacy in the Electric Smart Grid. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01225-9 - Aljosha Judmayer, Nicholas Stifter, Katharina Krombholz, Edgar R. Weippl:

Blocks and Chains: Introduction to Bitcoin, Cryptocurrencies, and Their Consensus Mechanisms. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01224-2
2016
- Vassil Roussev:

Digital Forensic Science: Issues, Methods, and Challenges. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01223-5, pp. 1-155 - Ninghui Li, Min Lyu, Dong Su, Weining Yang:

Differential Privacy: From Theory to Practice. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01222-8, pp. 1-138 - Sourya Joyee De, Daniel Le Métayer:

Privacy Risk Analysis. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01221-1, pp. 1-133 - Xiaofeng Chen:

Introduction to Secure Outsourcing Computation. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01220-4, pp. 1-93 - Josep Domingo-Ferrer, David Sánchez, Jordi Soria-Comas:

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2016, ISBN 978-3-031-01219-8, pp. 1-136
2015
- Per Larsen, Stefan Brunthaler

, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz:
Automated Software Diversity. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2015, ISBN 978-3-031-01218-1, pp. 1-88 - Jiliang Tang, Huan Liu:

Trust in Social Media. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2015, ISBN 978-3-031-01217-4, pp. 1-129
2014
- Christian Wachsmann, Ahmad-Reza Sadeghi:

Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions. Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers 2014, ISBN 978-3-031-01216-7, pp. 1-91 - Simson L. Garfinkel, Heather Richter Lipford:

Usable Security: History, Themes, and Challenges. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2014, ISBN 978-3-031-01215-0 - Ruchira Naskar, Rajat Subhra Chakraborty:

Reversible Digital Watermarking: Theory and Practices. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2014, ISBN 978-3-031-01214-3
2013
- N. Asokan, Lucas Vincenzo Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi:

Mobile Platform Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01213-6 - Barbara Carminati, Elena Ferrari, Marco Viviani:

Security and Trust in Online Social Networks. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01211-2 - Yingjiu Li, Robert H. Deng

, Elisa Bertino:
RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01212-9 - Christian Krieg, Adrian Dabrowski

, Heidelinde Hobel
, Katharina Krombholz, Edgar R. Weippl:
Hardware Malware. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627052511, pp. 1-115 - Xun Yi, Russell Paulet, Elisa Bertino:

Private Information Retrieval. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627051538, pp. 1-114 - Gabriel Ghinita:

Privacy for Location-based Services. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627051491, pp. 1-85
2012
- Sanjay Ganesh Kanade, Dijana Petrovska-Delacrétaz, Bernadette Dorizzi:

Enhancing Information Security and Privacy by Combining Biometrics with Cryptography. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2012, ISBN 978-3-031-01207-5
2010
- Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas W. Reps:

Analysis Techniques for Information Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2010, ISBN 978-3-031-01206-8
2008
- Trent Jaeger:

Operating System Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2008, ISBN 978-3-031-01205-1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














