000
|
|
nam5i |
001
|
|
2210080933875 |
003
|
|
DE-He213 |
005
|
|
20250321105255 |
007
|
|
cr nn 008mamaa |
008
|
|
240318s2024 sz | s |||| 0|eng d |
020
|
|
▼a9783031540752▼9978-3-031-54075-2 |
024
|
|
▼a10.1007/978-3-031-54075-2▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aTK7895.E42 |
050
|
|
▼aTK5105.8857 |
072
|
|
▼aTJF▼2bicssc |
072
|
|
▼aGPFC▼2bicssc |
072
|
|
▼aTEC008000▼2bisacsh |
072
|
|
▼aTJF▼2thema |
072
|
|
▼aGPFC▼2thema |
082
|
|
▼a621.38▼223 |
100
|
|
▼aHuang, Cheng.▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
245
|
00 |
▼aDecentralized Privacy Preservation in Smart Cities▼h[electronic resource] /▼cby Cheng Huang, Xuemin (Sherman) Shen. |
250
|
|
▼a1st ed. 2024. |
264
|
|
▼aCham :▼bSpringer Nature Switzerland :▼bImprint: Springer,▼c2024. |
300
|
|
▼aXII, 168 p. 45 illus., 36 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aWireless Networks,▼x2366-1445 |
505
|
|
▼aChapter 1. Introduction -- Chapter 2. Basic Techniques for Decentralized Privacy Preservation -- Chapter 3. Privacy-Preserving Identity Management in Car Sharing -- Chapter 4. Privacy-Preserving Cross-Domain Authentication in Internet of Things -- Chapter 5. Privacy-Preserving Data Analytics in Usage-Based Insurance -- Chapter 6. Privacy-Preserving Data Search in Cloud Storage -- Chapter 7. Conclusions and Future Research Directions. |
520
|
|
▼aThis book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities and privacy challenges and discuss the benefits of adopting decentralized trust models in achieving privacy preservation. The authors then give a comprehensive review of fundamental decentralized techniques and privacy-preserving cryptographic techniques. The next four chapters each detail a decentralized trust-based scheme, focusing respectively on privacy-preserving identity management, cross-domain authentication, data analytics, and data search, in specific use cases. Finally, the book explores open issues and outlines future research directions in the field of decentralized privacy preservation. Discusses benefits and challenges of applying decentralized trusts in smart cities Provides scheme designs and security analysis for use cases in smart cities, offering insights into applications Includes cryptographic knowledge accompanied by practical algorithm and protocol implementations. |
650
|
|
▼aCooperating objects (Computer systems). |
650
|
|
▼aTelecommunication. |
650
|
|
▼aData protection▼xLaw and legislation. |
650
|
|
▼aCyber-Physical Systems. |
650
|
|
▼aCommunications Engineering, Networks. |
650
|
|
▼aPrivacy. |
700
|
1 |
▼aShen, Xuemin (Sherman).▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9783031540745 |
776
|
|
▼iPrinted edition:▼z9783031540769 |
776
|
|
▼iPrinted edition:▼z9783031540776 |
830
|
|
▼aWireless Networks,▼x2366-1445 |
856
|
|
▼uhttps://doi.org/10.1007/978-3-031-54075-2 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |