Security
Security
Table of Contents
Introduction to Information Security
Cybersecurity
Hacking and Penetration Testing
Homeland Security and Cyber Warfare
Managing Information Security
Economics of Information Security and Privacy
Information Hiding and Steganography
Data Encryption
Hardening Software
Mobile Phone Security
Network Security
Mobile Network Security
Hardware Security
RFID Security
Sensor Network Security
Internet of Things (IoT) Security
Cloud Security
Smart Grid Security
Smart City Security
Reference Material
Online Publications Directly
Odds & Ends
=======================================
Cybersecurity ==========================
The Information Systems Security Officers Guide:
Establishing and Managing a Cyber Security Program;
Third Edition
Gerald L. Kovacich
Elsevier, 2016, ISBN 978-0-12-802190-3
http://www.sciencedirect.com/science/book/9780128021903
Cyber Security and IT Infrastructure Protection
John R. Vacca (Editor)
Elsevier, 2014, ISBN 978-0-12-416681-3
http://www.sciencedirect.com/science/book/9780124166813
Cyber Security: Deterrence and IT Protection for Critical
Infrastructures
Maurizio Martellini (Editor)
Springer, 2013, ISBN 978-3-319-02279-6
http://dx.doi.org/10.1007/978-3-319-02279-6
Cyber Crime and Cyber Terrorism Investigators Handbook
Babak Akhgar, Andrew Staniforth, and Francesca Bosco
(Editors)
Elsevier, 2014, ISBN 978-0-12-800743-3
http://www.sciencedirect.com/science/book/9780128007433
Cyber Reconnaissance, Surveillance and Defense
Robert Shimonski
Elsevier, 2015, ISBN 978-0-12-801308-3
http://www.sciencedirect.com/science/book/9780128013083
Cyber Security: Analytics, Technology and Automation
Martti Lehto and Pekka Neittaanmaki (Editors)
Springer, 2015, ISBN 978-3-319-18302-2
http://dx.doi.org/10.1007/978-3-319-18302-2
How to Attack and Defend Your Website
Henry Dalziel
Elsevier, 2015, ISBN 978-0-12-802732-5
http://www.sciencedirect.com/science/book/9780128027325
Theoretical and Experimental Methods for Defending Against
DDoS Attacks
Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri
Elsevier, 2016, ISBN 978-0-12-805391-1
http://www.sciencedirect.com/science/book/9780128053911
http://www.sciencedirect.com/science/book/9780128012758
Windows 2012 Server Network Security:
Securing Your Windows Network Systems and Infrastructure
Derrick Rountree
Elsevier, 2013, ISBN 978-1-59749-958-3
http://www.sciencedirect.com/science/book/9781597499583
Windows Server 2012 Security from End to Edge and Beyond:
Architecting, Designing, Planning, and Deploying
Windows Server 2012 Security Solutions
Thomas W. Shinder, Yuri Diogenes, and Debra Littlejohn
Shinder
Elsevier, 2013, ISBN 978-1-59749-980-4
http://www.sciencedirect.com/science/book/9781597499804
http://dx.doi.org/10.1016/B978-1-59749-980-4.09985-4
Investigating Computer-Related Crime, Second Edition
Peter Stephenson and Keith Gilbert
CRC Press, 2013, ISBN 978-1-4200-0370-3
http://dx.doi.org/10.1201/b14664
Cybercrimes: A Multidisciplinary Analysis
Sumit Ghosh and Elliot Turrini
Springer, 2010, ISBN 978-3-642-13547-7
http://dx.doi.org/10.1007/978-3-642-13547-7
RE09: Security Requirements Engineering (special issue)
Eric Dubois and Haralambos Mouratidis (Editors)
Requirements Engineering,
Volume 15, Number 1 (March 2010)
http://link.springer.com/journal/766/15/1/
6. Information Security Applications Based on Biomolecular
Systems
Guinevere Strack, Heather R. Lukarift,
Glenn R. Johnson, and Evgeny Katz
http://dx.doi.org/10.1002/9783527645480.ch6
Biomolecular Information Processing:
From Logic Systems to Smart Sensors and Actuators
Evgeny Katz (Editor)
Wiley, 2012, ISBN 9783527645480
http://dx.doi.org/10.1002/9783527645480
Cyber Security Policy Guidebook
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer,
Marcus H. Sachs, Jeffrey Schmidt, and Joseph Weiss
Wiley, 2012, ISBN 9781118241530
http://dx.doi.org/10.1002/9781118241530
Cryptographic Protocol:
Security Analysis Based on Trusted Freshness
Ling Dong and Kefei Chen
Springer, 2012, ISBN 978-3-642-24073-7
http://dx.doi.org/10.1007/978-3-642-24073-7
Engineering Secure Two-Party Computation Protocols:
Design, Optimization, and Applications of Efficient
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Advanced Persistent Threat: Understanding the Danger and
How to Protect Your Organization
Eric Cole
Elsevier, 2013, ISBN 978-1-59749-949-1
http://www.sciencedirect.com/science/book/9781597499491
Application of Big Data for National Security:
A Practitioners Guide to Emerging Technologies
Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia,
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Hide and Seek: An Introduction to Steganography
Data Hiding:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cyber Warfare: Steganography vs. Steganalysis
Huaiqing Wang and Shuozhong Wang
Communications of the ACM,
Volume 47, Number 10 (October 2004)
http://dx.doi.org/10.1145/1022594.1022597
Digital image steganography:
Survey and analysis of current methods
Abbas Cheddad, Joan Condelll, Kevin Curran,
and Paul Mc Kevitt
Signal Processing, Volume 90, Number 3 (2010)
http://dx.doi.org/10.1016/j.sigpro.2009.08.010
Disappearing Cryptography Information Hiding:
Steganography & Watermarking, Third Edition
Peter Wayner
Elsevier, 2009, ISBN 978-0-12-374479-1
http://www.sciencedirect.com/science/book/9780123744791
http://dx.doi.org/10.1007/978-1-4684-4730-9_5
Advances in Cryptology: Proceedings of Crypto 83
David Chaum (Editor)
Springer, 1984, ISBN 978-1-4684-4730-9
http://dx.doi.org/10.1007/978-1-4684-4730-9
http://dx.doi.org/10.1145/2366316.2366333
Identity-Based Encryption
Sanjit Chatterjee and Palash Sarkar
Springer, 2011, ISBN 978-1-4419-9383-0
http://dx.doi.org/10.1007/978-1-4419-9383-0
Practical Signcryption
Alexander W. Dent and Yuliang Zheng (Editors)
Springer, 2010, ISBN 978-3-540-89411-7
http://dx.doi.org/10.1007/978-3-540-89411-7
Simple Steps to Data Encryption:
A Practical Guide to Secure Computing
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-411483-8
http://www.sciencedirect.com/science/book/9780124114838
==================
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Security and Privacy Protection in Visual Sensor Networks:
A Survey
Thomas Winkler and Bernhard Rinner
ACM Computing Surveys, Volume 47, Number 1 (July 2014)
http://dx.doi.org/10.1145/2545883
================
Jonathan Zdziarski
Digital Investigation, Volume 11, Number 1 (March 2014)
http://dx.doi.org/10.1016/j.diin.2014.01.001
Mobile Authentication: Problems and Solutions
Markus Jacobson
Springer, 2013, ISBN 978-1-4614-4878-5
http://dx.doi.org/10.1007/978-1-4614-4878-5
Securing Android: A Survey, Taxonomy, and Challenges
Sufatrio , Darell J. J. Tan, Tong-Wei Chua,
and Vrizlynn L. L. Thing
ACM Computing Surveys, Volume 47, Number 4 (July 2015)
http://dx.doi.org/10.1145/2733306
Security in Mobile Wireless Networks (special issue)
Abderrahim Benslimane, Chadi Assi, Fred Nen-Fu Huang,
and Stamatios V. Kartapoulos (Editors)
Security and Telecommunications Networks,
Volume 3, Numbers 2-3 (March-June 2010)
http://dx.doi.org/10.1002/sec.142
Security Issues in Mobile NFC Devices
Michael Roland
Springer, 2015, ISBN 978-3-319-15488-6
http://dx.doi.org/10.1007/978-3-319-15488-6
Software Test Attacks to Break Mobile and Embedded Devices
Jon Duncan Hagar
=====================
Also see:
Smart City shelf in the
Information Technology section.
Architecture and Knowledge-Driven Self-Adaptive Security in
Smart Space
Antti Evesti, Jani Suomalainen, and Eila Ovaska
Computers, Volume 2, Number 1 (March 2013)
http://dx.doi.org/10.3390/computers2010034
Invited Paper:
VANET Security:
Going Beyond Cryptographic-Centric Solutions
Dhavy Gantsou
http://dx.doi.org/10.1007/978-981-287-158-9_4
Attack on Security Goals
(Confidentiality, Integrity, Availability) in VANET: A Survey
Irshad Ahmed Sumra, Halabi Bin Hasbullah,
and Jamalul-lail Bin AbManan
http://dx.doi.org/10.1007/978-981-287-158-9_5
Vehicular Ad-hoc Networks for Smart Cities:
Biometrics ============================
Encyclopedia of Biometrics
Stan Z. Li and Anil K. Jain (Editors)
Springer, Live Reference Constantly updated,
ISBN 978-3-642-27733-7
http://dx.doi.org/10.1007/978-3-642-27733-7
Multispectral Biometrics: Systems and Applications
David Zhang, Zhenhua Guo, and Yazhuo Gong
Springer, 2016, ISBN 978-3-319-22485-5
http://dx.doi.org/10.1007/978-3-319-22485-5
Introduction to Biometrics
Anil K. Jain, Arun A. Ross, and Karthik Nandakumar
Springer, 2011, ISBN 978-0-387-77325-4
http://dx.doi.org/10.1007/978-0-387-77326-1
Practical Biometrics: From Aspiration to Implementation,
Second Edition
Julian Ashbourn
Springer, 2015, ISBN 978-1-4471-6717-4
http://dx.doi.org/10.1007/978-1-4471-6717-4
Biometrics in the New World:
The Cloud, Mobile Technology and Pervasive Identity
Julian Ashbourn
Springer, 2014, ISBN 978-3-319-04159-9
http://dx.doi.org/10.1007/978-3-319-04159-9
Guide to Biometrics for Large-Scale Systems:
Technological, Operational, and User-Related Factors
Julian Ashbourn
Springer, 2011, ISBN 978-0-85729-467-8
http://dx.doi.org/10.1007/978-0-85729-467-8
Touchless Palmprint Recognition Systems
Angelo Genovese, Vincenzo Piuri, and Fabio Scotti
Springer, 2014, ISBN 978-3-319-10365-5
http://dx.doi.org/10.1007/978-3-319-10365-5
Security Impact of High Resolution Smartphone Cameras
Tobias Fiebig, Jan Krissler, and Ronny Hansch
8th USENIX Workshop on Offensive Technologies, WOOT14
https://www.usenix.org/conference/woot14/workshopprogram/presentation/fiebig
German minister photo fingerprint theft seemed far too
EASY, wail securobods: Security industry fear after apparent
digit sig nickery
John Leyden (30 December 2014)
The Register
http://www.theregister.co.uk/2014/12/30/hacking_fingerprint
s_get_a_hires_pic_and_commercial_software/
Implementation and evaluation of a remote authentication
system using touchless palmprint recognition
Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito,
Yutaka Miyake, and Takafumi Aoki
Multimedia Systems, Volume 19, Number 2 (2013)
http://dx.doi.org/10.1007/s00530-012-0283-z
Iris Biometrics: From Segmentation to Template Security
Christian Rathgeb, Andreas Uhl, and Peter Wild
Springer, 2013, ISBN 978-1-4614-5571-4
http://dx.doi.org/10.1007/978-1-4614-5571-4
Iris Biometric Model for Network Access
Franjieh El Khoury
CRC Press, 2013, ISBN 978-1-4665-0214-7
http://dx.doi.org/10.1201/b14817
A Survey of Ear Biometrics
Ayman Abaza, Arun Ross, Christina Hebert,
Mary Ann F. Harrison, and Mark S. Nixon
ACM Computing Surveys,
Volume 45, Number 2 (February 2013)
http://dx.doi.org/10.1145/2431211.2431221
Ear Biometrics in 2D and 3D: Localization and Recognition
http://dx.doi.org/10.1145/2659899
Communications of the ACM,
Volume 57, Number 10 (October 2014)
http://dl.acm.org/citation.cfm?id=2661061
Physical-Layer Security:
From Information Theory to Security Engineering
Matthieu Bloch and Joao Barros
Cambridge University Press, 2011, ISBN 9780511977985
http://dx.doi.org/10.1017/CBO9780511977985
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Basics of Digital Forensics:
The Primer for Getting Started in Digital Forensics,
Second Edition
John Sammons
Elsevier, 2015, ISBN 978-0-12-801635-0
http://www.sciencedirect.com/science/book/9780128016350
Digital Forensics: Threatscape and Best Practices
SM
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Google Earth Forensics: Using Google Earth Geo-Location in
Digital Forensic Investigations
Michael Harrington and Michael Cross
Elsevier, 2015, ISBN 976-0-12-800216-2
http://www.sciencedirect.com/science/book/9780128002162
Handbook of Digital Forensics of Multimedia Data and Devices
Anthony T.S. Ho and Shujun Li (Editors)
Wiley, 2015, ISBN 9781118705773
http://dx.doi.org/10.1002/9781118705773
http://www.sciencedirect.com/science/book/9780124078178
Cloud Storage Forensics
Darren Quick, Ben Martini, and Kim-Kwang Raymond Choo
Elsevier, 2014, ISBN 978-0-12-419970-5
http://www.sciencedirect.com/science/book/9780124199705
CyberForensics:
Understanding Information Security Investigations
Jennifer Bayuk (Editor)
Springer, 2010, ISBN 978-1-60761-772-3
http://dx.doi.org/10.1007/978-1-60761-772-3
Placing the Suspect Behind the Keyboard:
Using Digital Forensics and Investigative Techniques to
Identify Cybercrime Suspects
Brett Shavers
Elsevier, 2013, ISBN 978-1-59749-985-9
http://www.sciencedirect.com/science/book/9781597499859
Computer Incident Response and Forensics Team
Management: Conducting a Successful Incident Response
Leighton R. Johnson III
Elsevier, 2014, ISBN 978-1-59749-996-5
http://www.sciencedirect.com/science/book/9781597499965
X-Ways Forensics Practitioners Guide
Brett Shavers and Eric Zimmerman
Elsevier, 2014, ISBN 978-0-12-411605-4
http://www.sciencedirect.com/science/book/9780124116054
Digital Image Forensics:
There is More to a Picture than Meets the Eye
Husrev Taha Sencar and Nasir Memon (Editors)
Springer, 2013, ISBN 978-1-4614-0757-7
http://dx.doi.org/10.1007/978-1-4614-0757-7
Investigative Computer Forensics:
The Practical Guide for Lawyers, Accountants, Investigators,
and Business Executives
Erik Laykin
Wiley, 2013, ISBN 9781118572115
http://dx.doi.org/10.1002/9781118572115
Digital Forensics for Legal Professionals: Understanding
Digital Evidence From the Warrant to the Courtroom
Larry E. Daniel and Lars E. Daniel
Elsevier, 2012, ISBN 978-1-59749-643-8
http://www.sciencedirect.com/science/book/9781597496438
Digital evolution: history, challenges and future
directions for the digital and multimedia sciences section
David W. Baker et al.
http://dx.doi.org/10.1002/9781118373880.ch10
Forensic Science: Current Issues, Future Directions
Douglas H. Ubelaker (Editor)
Wiley, 2013, ISBN 9781118373880
http://dx.doi.org/10.1002/9781118373880
http://dx.doi.org/10.1007/978-3-642-24212-0
Advances in Digital Forensics VI:
Sixth IFIP WG 11.9 International Conference 2010
Kam-Pui Chow and Sujeet Shenoi (Editors)
Springer, 2010, ISBN 978-3-642-15506-2
http://dx.doi.org/10.1007/978-3-642-15506-2
Advances in Digital Forensics V:
Fifth IFIP WG 11.9 International Conference 2009
Gilbert Peterson and Sujeet Shenoi (Editors)
Springer, 2009, ISBN 978-3-642-04155-6
http://dx.doi.org/10.1007/978-3-642-04155-6
Advances in Digital Forensics iV
Indrajit Ray and Sujeet Shenoi (Editors)
Springer, 2008, ISBN 978-0-387-84927-0
http://dx.doi.org/10.1007/978-0-387-84927-0
Digital Forensics and Cyber Crime:
Third International ICST Conference, ICDF2C 2011
Pavel Gladyshev and Marcus K. Rogers (Editors)
Springer, 2012, ISBN 978-3-642-35515-8
http://dx.doi.org/10.1007/978-3-642-35515-8
Digital Forensics and Cyber Crime:
Second International ICST Conference, ICDF2C 2010
Ibrahim Baggili (Editor)
Springer, 2011, ISBN 978-3-642-19513-6
http://dx.doi.org/10.1007/978-3-642-19513-6
Digital Forensics and Cyber Crime:
First International ICST Conference, ICDF2C 2009
Sanjay Goel (Editor)
Springer, 2010, ISBN 978-3-642-11534-9
http://dx.doi.org/10.1007/978-3-642-11534-9
Open Source Software for Digital Forensics
Ewa Huebner and Stefano Zanero (Editors)
Springer, 2010, ISBN 978-1-4419-5803-7
http://dx.doi.org/10.1007/978-1-4419-5803-7
Linux Malware Incident Response: A Practitioners Guide to
Forensic Collection and Examination of Volatile Data
Cameron H. Malin, Foghan Casey, and James A. Aquilina
Elsevier, 2013, ISBN 978-0-12-409507-6
http://www.sciencedirect.com/science/book/9780124095076
Malware Forensic Field Guide for Windows Systems
Cameron Malin, Eoghan Casey, and James Aquilina
Elsevier, 2012, ISBN 978-1-59749-472-4
http://www.sciencedirect.com/science/book/9781597494724
Windows Registry Forensics: Advanced Digital Forensic
Analysis of the Windows Registry; Second Edition
Harlan Carvey
Elsevier, 2016, ISBN 978-0-12-803291-6
http://www.sciencedirect.com/science/book/9780128032916
Android Malware
Xuxian Jiang and Yajin Zhou
Springer, 2013, ISBN 978-1-4614-7394-7
http://dx.doi.org/10.1007/978-1-4614-7394-7
Android Malware and Analysis
Ken Dunham, Shane Hartman, Jose Andre Morales,
Manu Quintans, and Tim Strazzere
CRC Press, 2015, ISBN 978-1-4822-5220-0
http://dx.doi.org/10.1201/b17598
Automatic Malware Analysis: An Emulator Based Approach
Heng Yin and Dawn Song
Springer, 2013, ISBN 978-1-4614-5523-3
http://dx.doi.org/10.1007/978-1-4614-5523-3
PBX Security and Forensics: A Practical Approach
Iosif I. Androulidakis
Springer, 2013, ISBN 978-1-4614-1656-2
http://dx.doi.org/10.1007/978-1-4614-1656-2
A critical review of 7 years of Mobile Device Forensics
Konstantia Barmpatsalou, Dimitrios Damopoulas,
Georgios Kambourakis, and Vasilios Katos
Digital Investigation, Volume 10, Number 4 (December 2013)
http://dx.doi.org/10.1016/j.diin.2013.10.003
Identifying back doors, attack points,
Inside the SPAM Cartel: Trade Secrets from the Dark Side
Stu Sjouwerman and Jeffrey Posluns
Elsevier, 2004, ISBN 978-1-932266-86-3
http://www.sciencedirect.com/science/book/9781932266863
Risk
=================================
http://www.sciencedirect.com/science/book/9781597499866
Managing Online Risk:
Apps, Mobile, and Social Media Security
Deborah Gonzalez
Elsevier, 2015, ISBN 978-0-12-20055-5
http://www.sciencedirect.com/science/book/9780124200555
The Science and Technology of Counterterrorism:
Measuring Physical and Electronic Security Risk
Carl S. Young
Elsevier, 2015, ISBN 978-0-12-420056-2
http://www.sciencedirect.com/science/book/9780124200562
Trust =================================
A Comparison of Trust Models
Marc Sel
http://dx.doi.org/10.1007/978-3-658-10934-9_17
ISSE 2015: Highlights of the Information Security Solutions
Europe 2015 Conference
Helmut Reimer, Norbert Pohlmann, and Wolfgang Schneider
(Editors)
Programming ==========================
Advanced API Security: Securing APIs with OAuth 2.0,
OpenID Connect, JWS, and JWE
Prabath Siriwardena
Springer, 2014, ISBN 978-1-4302-6817-8
http://dx.doi.org/10.1007/978-1-4302-6817-8
Coding for Penetration Testers: Building Better Tools
Jason Andress and Ryan Linn
Elsevier, 2012, ISBN 978-1-59749-729-9
http://www.sciencedirect.com/science/book/9781597497299
Cryptography in C and C++
Michael Welschenbach
Springer, 2005, ISBN 978-1-4302-0026-0
http://dx.doi.org/10.1007/978-1-4302-0026-0
Foundations of Security:
What Every Programmer Needs to Know
Cryptography ==========================
http://dx.doi.org/10.1007/0-387-28835-X
Decrypted Secrets: Methods and Maxims of Cryptology
Friedrich Bauer
Springer, 2007, ISBN 978-3-540-48121-8
http://dx.doi.org/10.1007/978-3-540-48121-8
An Introduction to Mathematical Cryptography,
Second Edition
Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman
Springer, 2014, ISBN 978-1-4939-1711-2
http://dx.doi.org/10.1007/978-1-4939-1711-2
Foundations of Cryptography: Basic Tools
Oded Goldreich
Cambridge University Press, 2001, ISBN 9780511546891
http://dx.doi.org/10.1017/CBO9780511546891
Foundations of Cryptography II: Basic Applications
Oded Goldreich
Cambridge University Press, 2004, ISBN 9780511721656
http://dx.doi.org/10.1017/CBO9780511721656
Algebraic Cryptanalysis
Gregory V. Bard
Springer, 2009, ISBN 978-0-387-88757-9
http://dx.doi.org/10.1007/978-0-387-88757-9
Adaptive Cryptographic Access Control
http://dx.doi.org/10.1007/978-1-4471-5079-4
The Block Cipher Companion
Lars R. Knudsen and Matthew J.B. Robshaw
Springer, 2011, ISBN 978-3-642-17342-4
http://dx.doi.org/10.1007/978-3-642-17342-4
Security of Block Ciphers:
From Algorithm Design to Hardware Implementation
Kazuo Sakiyama, Yu Sasaki, and Yang Li
Wiley, 2015, ISBN 9781118660027
http://dx.doi.org/10.1002/9781118660027
Cryptography for Network Security:
Failures,
Successes and Challenges
Bart Preneel
http://dx.doi.org/10.1007/978-3-642-14706-7_4
From NLP (Natural Language Processing) to MLP (Machine
Language Processing)
Peter Teufl, Udo Payer, and Guenter Lackner
http://dx.doi.org/10.1007/978-3-642-14706-7_20
Computer Network Security: MMM-ACNS 2010
Igor Kotenko and Victor Skormin (Editors)
Springer, 2010, ISBN 98703-642-14706-7, LNCS 6258
http://dx.doi.org/10.1007/978-3-642-14706-7
Fault Analysis in Cryptography
Marc Joye and Michael Tunstall (Editors)
http://dx.doi.org/10.1007/978-3-662-44757-4
Symmetric Cryptographic Protocols
Mahalingam Ramkumar
Springer, 2015, ISBN 978-3-319-07584-6
http://dx.doi.org/10.1007/978-3-319-07584-6
Symmetric Key Encryption Through Data Structure and
Binary-Gray Conversion
Smita Paira, Sourabh Chandra, Sk. Safikul Alam,
and Siddharatha Bhattacharyya
http://dx.doi.org/10.1007/978-81-322-2550-8
A Rotation Based Encryption Technique USING Symmetric Key
Method
Sourabh Chandra, Smita Paira, Sk. Safikul Alam,
and Siddharatha Bhattacharyya
http://dx.doi.org/10.1007/978-81-322-2550-8_3
Emerging Research in Computing, Information,
Communication and Application: ERCICA 2015, Volume 1
N. R. Shetty, N.H. Prasad, and N. Nalini (Editors)
Springer, 2015, ISBN 978-81-322-2550-8
http://dx.doi.org/10.1007/978-81-322-2550-8
The Computational Lens Pauli Lectures, ETH Zurich
The P vs. NP Problem: Efficient Computation,
Internet Security, and the Limits to Human Knowledge
(May 7, 2012)
http://www.youtube.com/watch?v=pTeZP-XfuKI
Cryptography: Secrets and Lies, Knowledge and Trust
(May 8, 2012)
http://www.youtube.com/watch?v=Eu_j5_tains
Randomness the Utility of Unpredictability
(May 10, 2012)
http://www.youtube.com/watch?v=ZzsFb-6wvoE
Professor Avi Wigderson, Institute for Advanced Study
Website:
http://www.math.ias.edu/avi/
DBLP:
http://www.informatik.unitrier.de/~ley/pers/hd/w/Wigderson:Avi.html
http://crypto.stanford.edu/craig/
Fully Homomorphic Encryption Using Ideal Lattices
Proceedings of the 41st Annual ACM Symposium on Theory of
Computing (STOC 2009)
Craig Gentry
http://dx.doi.org/10.1145/1536414.1536440
Homomorphic Encryption and Applications
Xun Yi, Russell Paulet, and Elisa Bertino
Springer, 2014, ISBN 978-3-319-12229-8
http://dx.doi.org/10.1007/978-3-319-12229-8
Evaluating 2-DNF Formulas on Ciphertexts
Dan Boneh, Eu-Jin Coh, and Kobbi Nissim
http://dx.doi.org/10.1007/978-3-540-30576-7_18
Theory of Cryptography:
Second Theory of Cryptography Conference, TCC 2005
Joe Kilian (Editor)
Springer, 2005, ISBN 978-3-540-30576-7, LNCS 3378
http://dx.doi.org/10.1007/b106171
Fully Homomorphic Encryption without Bootstrapping:
ITCS 2012
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan
http://eprint.iacr.org/2011/277.pdf
Fully Homomorphic Encryption from Ring-LWE and Security
for Key Dependent Messages: Crypto 2011
Zvika Brakerski and Vinod Vaikuntanathan
http://dx.doi.org/10.1007/978-3-642-29011-4
Public Key Compression and Modulus Switching for Fully
Homomorphic Encryption over the Integers
Talk at EUROCRYPT 2012
Jean-Sebastien Coron
http://www.youtube.com/watch?v=SDIXprI3D7k
Fully Homomorphic Encryption with Polylog Overhead
Talk at EUROCRYPT 2012
http://www.youtube.com/watch?v=dIUU24jBFok
Talks at EUROCRYPT 2012
http://www.youtube.com/watch?v=X2W8YEppLbI&feature=list
_other&playnext=1&list=SPC73BF951C580030A
Implementing Gentrys Fully-Homomorphic Encryption
Scheme
Craig Gentry and Shai Halevi
http://dx.doi.org/10.1007/978-3-642-20465-4_9
Advances in Cryptology EUROCRYPT 2011
Kenneth G. Paterson (Editor)
Springer, 2011, ISBN 978-3-642-20464-7, LNCS 6632
http://dx.doi.org/10.1007/978-3-642-20465-4
Encrypted Messages from the Heights of Cryptomania
Craig Gentry
http://dx.doi.org/10.1007/978-3-642-36594-2_7
Theory of Cryptography,
10th Theory of Cryptography Conference, TCC2013
Amit Sahai (Editor)
Part 1
Part 2
Part 1
Part 2
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
How to Share a Secret (Chapter 17)
Johannes Blomer
http://dx.doi.org/10.1007/978-3-642-15328-0_17
Algorithms Unplugged
B. Vocking et al. (Editors)
Springer, 2011, ISBN 978-3-642-15328-0
http://dx.doi.org/10.1007/978-3-642-15328-0
How to Share a Secret
Adi Shamir
Communications of the ACM,
Volume 22, Number 11 (November 1979)
http://dx.doi.org/10.1145/359168.359176
Safeguarding cryptographic keys
G. R. Blakley
Proceedings AFIPS 1979 National Computer Conference
http://dx.doi.org/10.1109/AFIPS.1979.98
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The breadth of Shamirs secret-sharing scheme
http://dx.doi.org/10.1017/CBO9781107337756
Anonymity ============================
Seeking Anonymity in an Internet Panopticon
Joan Feigenbaum and Bryan Ford
Communications of the ACM,
Volume 58, Number 10 (October 2015)
http://dx.doi.org/10.1145/2714561
Dissent accountable anonymous group communication
http://dedis.cs.yale.edu/dissent/
Tor Project Anonymity Online
https://www.torproject.org/
Anonymization
Rolf H. Weber and Ulrike I. Heinrich
Springer, 2012, ISBN 978-1-4471-4066-5
http://dx.doi.org/10.1007/978-1-4471-4066-5
Anonymous Communication Networks:
Protecting Privacy on the Web
Kun Peng
CRC Press, 2014, ISBN 978-1-4398-8160-6
http://dx.doi.org/10.1201/b16756
On Anonymity in an Electronic Society:
A Survey of Anonymous Communication Systems
Matthew Edman and Bulent Yener
ACM Computing Surveys,
Volume 42, Number 1 (December 2009)
http://dx.doi.org/10.1145/1592451.1592456
The Dining Cryptographers Problem: Unconditional Sender
and Recipient Untraceability
David Chaum
Journal of Cryptology, Volume 1, Number 1 (January 1988)
http://dx.doi.org/10.1007/BF00206326
Practical Anonymity: Hiding in Plain Sight Online
Peter Loshin
Elsevier, 2013, ISBN 978-0-12-410404-4
http://www.sciencedirect.com/science/book/9780124104044
Privacy for Reporters of Human Rights Abuses:
Identity and Anonymity in Mobile Networks
Leonardo Martucci and Simone Fischer-Hubner
http://dx.doi.org/10.1007/978-94-007-1384-0_13
Personal Privacy in Mobile Networks
Claudio A. Ardagna, Sabrina De Capitani di Vimercati,
And Pierangela Samarati
http://dx.doi.org/10.1007/978-94-007-1384-0_14
Mobile Technologies for Conflict Management:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
You: for Sale Protecting Your Personal Data and
Privacy Online
Stuart Sumner
Elsevier, 2016, ISBN 978-0-12-803405-7
http://www.sciencedirect.com/science/book/978012803
4057
If Youre Not Paranoid, Youre Crazy
Walter Klein
Atlantic (November 2015)
http://www.theatlantic.com/magazine/archive/2015/11
/if-youre-not-paranoid-youre-crazy/407833/
http://dx.doi.org/10.1007/978-1-4471-6530-9
The End of Privacy (special issue)
Science, Volume 347, Number 6221 (30 January 2015)
http://www.sciencemag.org/content/347/6221.toc#SpecialIssu
e
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Against the Hypothesis of the End of Privacy:
An Agent-Based Modelling Approach to Social Media
Paola Tubaro, Antonio A. Casilli, and Yasaman Sarabi
Springer, 2014, ISBN 978-3-319-02456-1
http://dx.doi.org/10.1007/978-3-319-02456-1
Augmented Reality Law, Privacy, and Ethics:
Law, Society, and Emerging AR Technologies
Brian D. Wassom
Elsevier, 2015, ISBN 978-0-12-800208-7
http://www.sciencedirect.com/science/book/9780128002087
The Anthropologists View on Privacy
Martin Ortlieb
IEEE Security & Privacy,
Volume 12, Number 3 (May-June 2014)
http://dx.doi.org/10.1109/MSP.2014.57
The Basics of Digital Privacy: Simple Tools to Protect Your
Personal Information and Your Identity Online
Denny Cherry
Elsevier, 2014, ISBN 978-0-12-800011-3
http://www.sciencedirect.com/science/book/9780128000113
Big Data: A Business and Legal Guide
James R. Kalyvas and Michael R. Overly
CRC Press, 2015, ISBN 978-1-4665-9238-4
http://dx.doi.org/10.1201/b17406
Can You Engineer Privacy?
Seda Gurses
Communications of the ACM,
Volume 57, Number 8 (August 2014)
http://dx.doi.org/10.1145/2633029
Cloud identity management security issues & solutions:
a taxonomy
Umme Habiba, Rahat Masood, Muhammad Awais Shibli, and
Muaz A Niazi
Complex Adaptive Systems Modeling, Volume 2 (2014)
http://www.casmodeling.com/content/2/1/5
Data Brokers: A Call for Transparency and Accountability
Federal Trade Commission (May 2014)
http://www.ftc.gov/reports/data-brokers-call-transparencyaccountability-report-federal-trade-commission-may-2014
Digital Identities: Creating and Communicating the Online Self
Rob Cover
Privacy Online:
Perspectives on Privacy and Self-Disclosure in the Social Web
Sabine Trepte and Leonard Reinecke (Editors)
Springer, 2011, ISBN 978-3-642-21521-6
http://dx.doi.org/10.1007/978-3-642-21521-6
The Privacy Engineers Manifesto:
Getting from Policy to Code to QA to Value
Michelle Finneran Dennedy, Jonathan Fox,
and Thomas R. Finneran
Springer, 2014, ISBN 978-1-4302-6356-2
http://dx.doi.org/10.1007/978-1-4302-6356-2
Privacy Technologies and Policy First Annual Privacy Forum,
APF 2012
Bart Prenel and Demosthenes Ikonomou (Editors)
Springer, 2014, ISBN 978-3-642-54069-1, LNCS 8319
http://dx.doi.org/10.1007/978-3-642-54069-1
Privacy Technologies and Policy Second Annual Privacy
Forum, APF 2014
Bart Prenel and Demosthenes Ikonomou (Editors)
Springer, 2014, ISBN 978-3-319-06749-0, LNCS 8450
http://dx.doi.org/10.1007/978-3-319-06749-0
Protecting Privacy in Data Release
Giovanni Livraga
Springer, 2015, ISBN 978-3-319-16109-9
http://dx.doi.org/10.1007/978-3-319-16109-9
Protection of personal data
Factsheet on the Right to be Forgotten ruling (C-131-12)
European Commission Directorate-General for Justice (2012)
http://ec.europa.eu/justice/data-protection/index_en.htm
Quo vadis, data privacy?
Johannes Gehrke
Annals of the New York Academy of Sciences,
Volume 1260, Number 1 (July 2012)
http://dx.doi.org/10.1111/j.1749-6632.2012.06630.x
Reforming European Data Protection Law
Serge Gutwirth, Ronald Leenes, and Paul de Hert (Editors)
Springer, 2015, ISBN 978-94-017-9385-8
http://dx.doi.org/10.1007/978-94-017-9385-8
Data Protection on the Move:
Current Developments in ICT and Privacy/Data Protection
Serge Gutwirth, Ronald Leenes, and Paul De Hert (Editors)
Springer, 2016, ISBN 978-94-017-7376-8
http://dx.doi.org/10.1007/978-94-017-7376-8
RFID the Next STEP in Consumer-Product Relations or
Orwellian Nightmare? Challenges for Research and Policy
Dag Settemeas
Journal of Consumer Policy,
Volume 32, Number 3 (September 2009)
http://dx.doi.org/10.1007/s10603-009-9103-z
Security and Privacy for Augmented Reality Systems
Franciska Roesner, Tadayoshi Kohno, and David Molnar
Communications of the ACO,
Volume 57, Number 4 (April 2014)
http://dx.doi.org/10.1145/2580723.2580730
SmartData: Privacy Meets Evolutionary Robotics
Inman Harvey, Ann Cavoukian, George Tomko, Don Borett,
Hon Kwan, and Dimitrios Hatzinalos (Editors)
Springer, 2013, ISBN 978-1-4614-6409-9
http://dx.doi.org/10.1007/978-1-4614-6409-9
Thors OS Xodus: Why and How I Left Windows for OS X
Timothy Thor Mullen with Katherine Ridgway
Elsevier, 2016, ISBN 978-0-12-410463-1
http://www.sciencedirect.com/science/book/9780124104631
Trust and Privacy in Electronic Commerce (special issue)
Peter Herrmann and Mozhgan Tavakolifard
Electronic Commerce Research,
Volume 10, Numbers 3-4 (December 2010)
http://link.springer.com/journal/10660/10/3/
Unauthorized Access: The Crisis in Online Privacy and Security
Robert H. Sloan and Richard Warner
CRC Press, 2014, ISBN 978-1-4398-3014-7
http://dx.doi.org/10.1201/b15148
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
C.A.S.P.I.A.N.
Consumers Against Supermarket Privacy Invasion and
Numbering
http://www.nocards.org/
Deeplinks Blog posts about Biometrics
https://www.eff.org/deeplinks/biometrics
Deeplinks Topics
https://www.eff.org/deeplinks/archives
Electronic Frontier Foundation
https://www.eff.org/
Privacy
https://epic.org/privacy/
Electronic privacy Information Center
https://epic.org/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Uniquely Me! How much information does it take
to single out one person among billions?
Brian Hayes
American Scientist,
Volume 102, Number 2 (March-April 2014)
http://dx.doi.org/10.1511/2014.107.106
Data and privacy (special report):
Now you see me, now you dont.
A new model for data sharing.
Why modern governance needs statisticians.
Brian Tarran, Brian Sweatt, Sam Smith
Significance, Volume 11, Number 4 (October 2014)
http://dx.doi.org/10.1111/j.1740-9713.2014.00762.x
Data privacy
Vicenc Torra and Guillermo Navarro-Arribas
Wiley Interdisciplinary Reviews:
Data Mining and Knowledge Discovery,
Volume 4, Number 4 (July/August 2014)
http://dx.doi.org/10.1002/widm.1129
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Advanced Research in Data Privacy
Guillermo Navarro-Arribas and Vicenc Torra (Editors)
E-Cash ================================
Anonymous Transferable E-Cash
Foteini Baldimitsi, Melissa Chase, Georg Fuchsbauer,
and Markulf Kohlweiss
http://dx.doi.org/10.1007/978-3-662-46447-2_5
Public-Key Cryptography PKC 2015
Jonathan Katz (Editor)
Springer, 2015, ISBN 978-3-662-46447, LNCS 9020
http://dx.doi.org/10.1007/978-3-662-46447-2
=======================================
Harboring Data:
Information Security, Law, and the Corporation
Andrea M. Matwyshyn (Editor)
Stanford University Press, 2009, ISBN 9780804760089
http://dx.doi.org/10.11126/stanford/9780804760089.001.0001
Managing Cyber Attacks in International Law, Business, and
Relations: In Search of Cyber Peace
Scott Shackelford
Cambridge University Press, 2014, ISBN 9781139021838
http://dx.doi.org/10.1017/CBO9781139021838
The Privacy Paradox: Privacy and Its Conflicting Values
Stanford Law Review Online
(February 02, 2012 April 12, 2012)
http://www.stanfordlawreview.org/online/privacy-paradox