Explore the latest books of this year!
Bookbot

Xiaodong Lin

    Cywilizacja
    Privacy-Enhancing Fog Computing and Its Applications
    Gender, Modernity and Male Migrant Workers in China
    Security and Privacy in Mobile Social Networks
    Introductory Computer Forensics
    • 2018

      This SpringerBrief addresses the security and privacy challenges in fog computing and proposes secure mechanisms to enhance fog-assisted IoT applications. It begins with an overview of the architecture and challenges in fog computing. The authors categorize existing privacy-enhancing techniques into identity-hidden techniques, location privacy protection, and data privacy enhancement, highlighting their importance in overcoming obstacles that hinder the development of IoT applications. They introduce three secure protocols tailored for smart parking navigation, mobile crowdsensing, and smart grid applications. In smart parking navigation, the authors propose a system that prevents identity leakage while ensuring efficient parking guidance via roadside units. For mobile crowdsensing, they present a privacy-preserving task allocation scheme that facilitates location-based task distribution without revealing participants' location or reputation. In the context of smart grids, an efficient smart metering protocol is introduced, allowing for real-time data collection with enhanced privacy through data aggregation. The brief concludes with insights on future research directions, emphasizing the balance between extending IoT device functionality and maintaining user security and privacy against dishonest fog nodes. It serves as a valuable resource for researchers and professionals focused on security and privacy in wireless commu

      Privacy-Enhancing Fog Computing and Its Applications
    • 2018

      Introductory Computer Forensics

      A Hands-on Practical Approach

      • 600 pages
      • 21 hours of reading

      This textbook introduces digital forensics, an essential field for crime-solving. It comprises 21 chapters, each focusing on a specific forensic topic divided into two parts: background knowledge and hands-on practice. Each theoretical section ends with review questions to assess students’ understanding, while practice exercises allow them to apply the concepts learned. The hands-on approach is designed to enhance students' comprehension of digital forensics through practical experience in collecting and preserving digital evidence. With 20 inquiry-based exercises, students will gain insights into digital forensic concepts and investigation techniques. Aimed at upper undergraduate and graduate students in digital-forensic courses or research, it also serves as a valuable reference for digital forensics practitioners, IT security analysts, and security engineers in the IT security industry, particularly those involved in digital investigations and incident handling.

      Introductory Computer Forensics
    • 2013

      Gender, Modernity and Male Migrant Workers in China

      Becoming a 'Modern' Man

      • 168 pages
      • 6 hours of reading

      Focusing on the identity formation of Chinese male migrant workers, the book delves into their experiences of rural-urban migration and their roles within a dislocated urban working class. It offers a detailed analysis of gender and class dynamics, highlighting how these men navigate and interpret their new lives in the context of modernizing post-Mao China.

      Gender, Modernity and Male Migrant Workers in China
    • 2013

      This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy- preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems.

      Security and Privacy in Mobile Social Networks