Normal view MARC view ISBD view

Privacy and security for mobile crowdsourcing

By: Sodagari, Shabnam.
Material type: materialTypeLabelBookSeries: River Publishers series in digital security and forensics.Publisher: New York : River Publisher, 2023Description: xvii, 123 p. ; iil. (some col.), 24 cm.ISBN: 9788770228619.Subject(s): Security | Telecommunications | Human computation | Wi-Fi sharing | Fake news | Misinformation Thwarted | Robust Incentive Mecanisms | k-Anonymity cloakingDDC classification: 005.8 Summary: This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help build intuition to apply these concepts to a broad range of system security domains toward dimensioning of next generations of mobiles crowdsensing applications. This book offers vigorous techniques as well as new insights for both beginners and seasoned professionals. It reflects on recent advances and research achievements. Technical topics discussed in the book include but are not limited to: ⁰́Ø Risks affecting crowdsensing platforms ⁰́Ø Spatio-temporal privacy of crowdsourced applications ⁰́Ø Differential privacy for data mining crowdsourcing ⁰́Ø Blockchain-based crowdsourcing ⁰́Ø Secure wireless mobile crowdsensing. This book is accessible to readers in mobile computer/communication industries as well as academic staff and students in computer science, electrical engineering, telecommunication systems, business information systems, and crowdsourced mobile app developers.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes index.

This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help build intuition to apply these concepts to a broad range of system security domains toward dimensioning of next generations of mobiles crowdsensing applications. This book offers vigorous techniques as well as new insights for both beginners and seasoned professionals. It reflects on recent advances and research achievements. Technical topics discussed in the book include but are not limited to: ⁰́Ø Risks affecting crowdsensing platforms ⁰́Ø Spatio-temporal privacy of crowdsourced applications ⁰́Ø Differential privacy for data mining crowdsourcing ⁰́Ø Blockchain-based crowdsourcing ⁰́Ø Secure wireless mobile crowdsensing. This book is accessible to readers in mobile computer/communication industries as well as academic staff and students in computer science, electrical engineering, telecommunication systems, business information systems, and crowdsourced mobile app developers.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha