Title from title screen.Includes index.Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts belie…
Annotation Privacy is the capacity to negotiate social relationships by controlling access to personal information. As laws, policies, and technological design increasingly structure people's relationships with social institutions, individual privacy faces new threats and new opportunities. Over the last several years, the realm of technology and privacy has been transformed, creating a landsca…
This book constitutes the refereed proceedings of the 9th International Conference on Web Reasoning and Rule Systems, RR 2015, held in Berlin, Germany, in August 2015. The 5 full papers, 4 technical communications presented together with 4 invited talks were carefully reviewed and selected from 16 submissions. The scale and the heterogenous nature of web data poses many challenges, and turns ba…
Introductory textbook covering all the main features of the 'web programming' languages PHP and MySQL together with detailed examples that will enable readers (whether students on a taught course or independent learners) to use them to create their own applications or understand existing ones. A particular focus is the use of PHP to generate MySQL commands from a script as it is executed. E…
This two volume set LNCS 9418 and LNCS 9419 constitutes the proceedings of the 16th International Conference on Web Information Systems Engineering, WISE 2015, held in Miami, FL, USA, in November 2015. The 53 full papers, 17 short and 14 special sessions and invited papers, presented in these proceedings were carefully reviewed and selected from 189 submissions. The papers cover the areas of…
This two volume set LNCS 9418 and LNCS 9419 constitutes the proceedings of the 16th International Conference on Web Information Systems Engineering, WISE 2015, held in Miami, FL, USA, in November 2015. The 53 full papers, 17 short and 14 special sessions and invited papers, presented in these proceedings were carefully reviewed and selected from 189 submissions. The papers cover the areas of b…
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…
This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of…