Normal view MARC view ISBD view

Security and Privacy in Social Networks [electronic resource] /edited by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland.

by Altshuler, Yaniv [editor.]; Elovici, Yuval [editor.]; Cremers, Armin B [editor.]; Aharony, Nadav [editor.]; Pentland, Alex [editor.]; SpringerLink (Online service).
Material type: materialTypeLabelBookPublisher: New York, NY : Springer New York : 2013.Description: VI, 253 p. 49 illus. online resource.ISBN: 9781461441397.Subject(s): Computer science | Computer Communication Networks | Data protection | Computer Science | Computer Communication Networks | Systems and Data Security | Information Systems Applications (incl. Internet)DDC classification: 004.6 Online resources: Click here to access online
Contents:
Introduction to Security and Privacy in Social Networks -- Interdisciplinary Impact Analysis of Privacy in Social Networks -- Recognizing Your Digital Friends -- Encryption for Peer-to-Peer Social Networks -- Crowdsourcing and Ethics -- The Effect of Social Status on Decision-Making and Prices in Financial Networks -- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) -- Applications of k-Anonymity and ℓ-Diversity in Publishing Online Social Networks -- Links Reconstruction Attack -- An Analysis of Anonymity in the Bitcoin System -- Privacy-Preserving Data Integration using Decoupled Data.
In: Springer eBooksSummary: n/a
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
MAIN LIBRARY
TK5105.5-5105.9 (Browse shelf) Available

Introduction to Security and Privacy in Social Networks -- Interdisciplinary Impact Analysis of Privacy in Social Networks -- Recognizing Your Digital Friends -- Encryption for Peer-to-Peer Social Networks -- Crowdsourcing and Ethics -- The Effect of Social Status on Decision-Making and Prices in Financial Networks -- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) -- Applications of k-Anonymity and ℓ-Diversity in Publishing Online Social Networks -- Links Reconstruction Attack -- An Analysis of Anonymity in the Bitcoin System -- Privacy-Preserving Data Integration using Decoupled Data.

n/a

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha