Normal view MARC view ISBD view

Security and Privacy in Social Networks [electronic resource] / edited by Yaniv Altshuler, Yuval Elovici, Armin B. Cremers, Nadav Aharony, Alex Pentland.

By: Altshuler, Yaniv [editor.].
Contributor(s): Elovici, Yuval [editor.] | Cremers, Armin B [editor.] | Aharony, Nadav [editor.] | Pentland, Alex [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookPublisher: New York, NY : Springer New York : Imprint: Springer, 2013Description: VI, 253 p. 49 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781461441397.Subject(s): Computer science | Computer Communication Networks | Data protection | Computer Science | Computer Communication Networks | Systems and Data Security | Information Systems Applications (incl. Internet)DDC classification: 004.6 Online resources: Click here to access online
Contents:
Introduction to Security and Privacy in Social Networks -- Interdisciplinary Impact Analysis of Privacy in Social Networks -- Recognizing Your Digital Friends -- Encryption for Peer-to-Peer Social Networks -- Crowdsourcing and Ethics -- The Effect of Social Status on Decision-Making and Prices in Financial Networks -- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) -- Applications of k-Anonymity and ℓ-Diversity in Publishing Online Social Networks -- Links Reconstruction Attack -- An Analysis of Anonymity in the Bitcoin System -- Privacy-Preserving Data Integration using Decoupled Data.
In: Springer eBooksSummary: n/a
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Introduction to Security and Privacy in Social Networks -- Interdisciplinary Impact Analysis of Privacy in Social Networks -- Recognizing Your Digital Friends -- Encryption for Peer-to-Peer Social Networks -- Crowdsourcing and Ethics -- The Effect of Social Status on Decision-Making and Prices in Financial Networks -- Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) -- Applications of k-Anonymity and ℓ-Diversity in Publishing Online Social Networks -- Links Reconstruction Attack -- An Analysis of Anonymity in the Bitcoin System -- Privacy-Preserving Data Integration using Decoupled Data.

n/a

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue