Location Privacy in Mobile Applications Location Privacy in Mobile Applications
SpringerBriefs on Cyber Security Systems and Networks

Location Privacy in Mobile Applications

Bo Liu y otros
    • USD 39.99
    • USD 39.99

Descripción editorial

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

GÉNERO
Informática e Internet
PUBLICADO
2018
30 de agosto
IDIOMA
EN
Inglés
EXTENSIÓN
112
Páginas
EDITORIAL
Springer Nature Singapore
VENDEDOR
Springer Nature B.V.
TAMAÑO
3.9
MB
Face De-identification: Safeguarding Identities in the Digital Era Face De-identification: Safeguarding Identities in the Digital Era
2024
The 7th International Conference on Information Science, Communication and Computing The 7th International Conference on Information Science, Communication and Computing
2023
Adversarial Machine Learning Adversarial Machine Learning
2023
DIFFERENTIAL QUADRATURE HIERARCHICAL FINITE ELEMENT METHOD, DIFFERENTIAL QUADRATURE HIERARCHICAL FINITE ELEMENT METHOD,
2021
War Emperor War Emperor
2020
War Emperor War Emperor
2020
Privacy-Preserving Machine Learning Privacy-Preserving Machine Learning
2022
Privacy-Preserving Deep Learning Privacy-Preserving Deep Learning
2021
Design and Cryptanalysis of ZUC Design and Cryptanalysis of ZUC
2021
Cybersecurity in Digital Transformation Cybersecurity in Digital Transformation
2020
Big Digital Forensic Data Big Digital Forensic Data
2018
Advanced Monitoring in P2P Botnets Advanced Monitoring in P2P Botnets
2018