001433217 000__ 04535cam\a2200625\i\4500 001433217 001__ 1433217 001433217 003__ OCoLC 001433217 005__ 20230309003555.0 001433217 006__ m\\\\\o\\d\\\\\\\\ 001433217 007__ cr\un\nnnunnun 001433217 008__ 201128s2021\\\\sz\\\\\\ob\\\\000\0\eng\d 001433217 019__ $$a1225066461$$a1225548707$$a1237463292$$a1238203267$$a1241065676$$a1244636382$$a1246358621 001433217 020__ $$a9783030588960$$q(electronic bk.) 001433217 020__ $$a3030588963$$q(electronic bk.) 001433217 020__ $$z9783030588953 001433217 020__ $$z3030588955 001433217 0247_ $$a10.1007/978-3-030-58896-0$$2doi 001433217 035__ $$aSP(OCoLC)1228843668 001433217 040__ $$aUPM$$beng$$erda$$epn$$cUPM$$dOCLCO$$dOCLCQ$$dYDXIT$$dOCLCF$$dGW5XE$$dYDX$$dEBLCP$$dOCLCO$$dDCT$$dN$T$$dOCL$$dOCLCO$$dOCLCQ 001433217 049__ $$aISEA 001433217 050_4 $$aQA76.9.A25$$bL58 2021 001433217 08204 $$a005.8$$223 001433217 1001_ $$aLiu, Alex X.,$$eauthor. 001433217 24510 $$aAlgorithms for data and computation privacy /$$cAlex X. Liu, Rui Li. 001433217 264_1 $$aCham :$$bSpringer,$$c[2021] 001433217 300__ $$a1 online resource 001433217 336__ $$atext$$btxt$$2rdacontent 001433217 337__ $$acomputer$$bc$$2rdamedia 001433217 338__ $$aonline resource$$bcr$$2rdacarrier 001433217 347__ $$atext file 001433217 347__ $$bPDF 001433217 504__ $$aIncludes bibliographical references. 001433217 5050_ $$aPart I Privacy Preserving Queries -- Range Queries over Encrypted Data -- Fast and Scalable Range and Keyword Query Processing over Encrypted Data with Provable Adaptive Security -- Nearest Neighbor Queries over Encrypted Data -- K-nearest Neighbor Queries over Encrypted Data -- Top-k Queries for Two-tiered Sensor Networks -- Part II Privacy Preserving Computation -- Collaborative Enforcement of Firewall Policies in Virtual Private Networks -- Privacy Preserving Quantification of Cross-Domain Network Reachability -- Cross-Domain Privacy-Preserving Cooperative Firewall Optimization -- Privacy Preserving String Matching for Cloud Computing -- Privacy Preserving Information Hub Identification in Social Networks -- Part III Differential Privacy -- Publishing Social Network Data with Privacy Guarantees -- Predictable Privacy-Preserving Mobile Crowd Sensing -- Differentially Private and Budget Limited Bandit Learning over Matroids -- Part IV Breaking Privacy -- Breaching Privacy in Encrypted Instant Messaging Networks. 001433217 506__ $$aAccess limited to authorized users. 001433217 520__ $$aThis book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text. 001433217 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 9, 2021). 001433217 650_0 $$aComputer security. 001433217 650_0 $$aComputer networks$$xSecurity measures. 001433217 650_0 $$aComputer algorithms. 001433217 650_0 $$aComputer networks. 001433217 650_6 $$aSécurité informatique. 001433217 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures. 001433217 650_6 $$aAlgorithmes. 001433217 650_6 $$aRéseaux d'ordinateurs. 001433217 655_0 $$aElectronic books. 001433217 7001_ $$aLi, Rui,$$eauthor. 001433217 77608 $$iPrint version:$$z9783030588953 001433217 77608 $$iPrint version:$$z9783030588977 001433217 77608 $$iPrint version:$$z9783030588984 001433217 852__ $$bebk 001433217 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-58896-0$$zOnline Access$$91397441.1 001433217 909CO $$ooai:library.usi.edu:1433217$$pGLOBAL_SET 001433217 980__ $$aBIB 001433217 980__ $$aEBOOK 001433217 982__ $$aEbook 001433217 983__ $$aOnline 001433217 994__ $$a92$$bISE