This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware, and it analyzes current trends in malware activity online.
This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. It reviews a series of methods that can precisely answer data cube-style OLAP, regarding sensitive data while provably preventing adversaries from inferring data.
Secure Key Establishment discusses the problems encountered in this field. It also introduces several improved protocols with new proofs of security and covers several variants of the widely accepted Bellare and Rogaway model.
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as text for computer science courses in wireless systems and security.
This book provides a broad overview of the many card systems and solutions in practical use today. It combines a cross-discipline overview of smart cards, tokens and related security and applications, plus a technical reference to support further research and study.