This book emerges as a seminal work, addressing the critical need for robust security for power line communications (PLC), during an era where digital interconnectivity is paramount yet vulnerable.
The book offers a provocative review of thinking about privacy and identity in the years encompassing and disrupted by the two world wars of the first half of the twentieth century - focusing (in particular) on the socio-technological transformations associated with modernism.
This two-volume set LNCS 14509-14510, constitutes the refereed proceedings of the First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, held in Guangzhou, China, during December 3-5, 2023.
Mobile crowdsensing is a new sensing paradigm that utilizes the intelligence of a crowd of individuals to collect data for mobile purposes by using their portable devices, such as smartphones and wearable devices.
This book constitutes the proceedings of the 5th International Conference on Financial Technology, ICFT 2024, held in Singapore during September 23-25, 2024.
This book constitutes the refereed proceedings of the 7th International Conference on Cognitive Computing, ICCC 2023, held in Shenzhen, China, during December 17-18, 2023.
This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This volume originated from an international, interdisciplinary research course organized by the Institute of Information Management of the University of Munster in 2021-2022, funded by the DAAD IVAC sponsorship program.
'Reasonable expectations of privacy' have become a cornerstone concept in privacy and data protection legislation worldwide, extending today from US constitutional law to the GDPR, Article 8 ECHR, and various Asian and African data protection frameworks.
This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications.
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017.
'Reasonable expectations of privacy' have become a cornerstone concept in privacy and data protection legislation worldwide, extending today from US constitutional law to the GDPR, Article 8 ECHR, and various Asian and African data protection frameworks.
This book constitutes the thoroughly refereed post conference papers of the First International Conference on Blockchain and Trustworthy Systems, Blocksys 2019, held in Guangzhou, China, in December 2019.
This book constitutes the proceedings of the 30th International Conference on Web Services, ICWS 2023, held as Part of the Services Conference Federation, SCF 2023, held in Honolulu, HI, USA, in September 2023.
An ideal primer for anyone implementing a PIMS based on ISO/IEC 27701ISO/IEC 27701:2019 is a privacy extension to the international information security management standard, ISO/IEC 27001.
On 5 June 2013, the Guardian began publishing a series of documents leaked by NSA contractor Edward Snowden, revealing the extent of internet surveillance undertaken by government and intelligence agencies.
In the 1970s and 1980s West Germany was a pioneer in both the use of the new information technologies for population surveillance and the adoption of privacy protection legislation.