Читать книгу Digital Forensic Science - Vassil Roussev - Страница 3

Оглавление

Synthesis Lectures on Information Security, Privacy, & Trust

Editor

Elisa Bertino, Purdue University

Ravi Sandhu, University of Texas, San Antonio

The Synthesis Lectures Series on Information Security, Privacy, and Trust publishes 50- to 100-page publications on topics pertaining to all aspects of the theory and practice of Information Security, Privacy, and Trust. The scope largely follows the purview of premier computer security research journals such as ACM Transactions on Information and System Security, IEEE Transactions on Dependable and Secure Computing and Journal of Cryptology, and premier research conferences, such as ACM CCS, ACM SACMAT, ACM AsiaCCS, ACM CODASPY, IEEE Security and Privacy, IEEE Computer Security Foundations, ACSAC, ESORICS, Crypto, EuroCrypt and AsiaCrypt. In addition to the research topics typically covered in such journals and conferences, the series also solicits lectures on legal, policy, social, business, and economic issues addressed to a technical audience of scientists and engineers. Lectures on significant industry developments by leading practitioners are also solicited.

Digital Forensic Science: Issues, Methods, and Challenges

Vassil Roussev

2016

Differential Privacy: From Theory to Practice

Ninghui Li, Min Lyu, Dong Su, and Weining Yang

2016

Privacy Risk Analysis

Sourya Joyee De and Daniel Le Métayer

2016

Introduction to Secure Outsourcing Computation

Xiaofeng Chen

2016

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

Josep Domingo-Ferrer, David Sánchez, and Jordi Soria-Comas

2016

Automated Software Diversity

Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, and Michael Franz

2015

Trust in Social Media

Jiliang Tang and Huan Liu

2015

Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

Christian Wachsmann and Ahmad-Reza Sadeghi

2014

Usable Security: History, Themes, and Challenges

Simson Garfinkel and Heather Richter Lipford

2014

Reversible Digital Watermarking: Theory and Practices

Ruchira Naskar and Rajat Subhra Chakraborty

2014

Mobile Platform Security

N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, and Ahmad-Reza Sadeghi

2013

Security and Trust in Online Social Networks

Barbara Carminati, Elena Ferrari, and Marco Viviani

2013

RFID Security and Privacy

Yingjiu Li, Robert H. Deng, and Elisa Bertino

2013

Hardware Malware

Christian Krieg, Adrian Dabrowski, Heidelinde Hobel, Katharina Krombholz, and Edgar Weippl

2013

Private Information Retrieval

Xun Yi, Russell Paulet, and Elisa Bertino

2013

Privacy for Location-based Services

Gabriel Ghinita

2013

Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

Sanjay G. Kanade, Dijana Petrovska-Delacrétaz, and Bernadette Dorizzi

2012

Analysis Techniques for Information Security

Anupam Datta, Somesh Jha, Ninghui Li, David Melski, and Thomas Reps

2010

Operating System Security

Trent Jaeger

2008

Digital Forensic Science

Подняться наверх