![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
310 Result(s)
-
Book Series
-
Chapter
GenAI Model Security
Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begin...
-
Chapter
The Future Development Trends of Privacy Computing
We propose to abstract, condense, and foresee the future development trends of privacy computing from three aspects: the research scope of privacy computing, the evolution of privacy computing theory and techn...
-
Book
-
Chapter and Conference Paper
The Key Lattice Framework for Concurrent Group Messaging
Today, two-party secure messaging is well-understood and widely adopted, e.g., Signal and WhatsApp. Multiparty protocols for secure group messaging are less mature and many protocols with different tradeoffs ...
-
Chapter and Conference Paper
A Fuzzy Logical RAT Selection Scheme in SDN-Enabled 5G HetNets
Mobile communication systems are witnessing an ongoing-increase in connected devices and new types of services. This considerable increase has led to an exponential augmentation in mobile data traffic volume. ...
-
Chapter
Introduction
The continuous evolution and pervasive application of communication technology, network technology, and computing technology have boosted interconnection of everything and ubiquitous sharing of information. Wi...
-
Chapter
Privacy Computing Theory
Over the past 20 years, privacy preservation has received extensive attention. However, existing research has focused on scattered privacy-preserving methods for specific scenarios, and there is no systematic ...
-
Chapter and Conference Paper
Improvement and Evaluation of Resilience of Adaptive Cruise Control Against Spoofing Attacks Using Intrusion Detection System
The Adaptive Cruise Control (ACC) system automatically adjusts the vehicle speed to maintain a safe distance between the vehicle and the lead (ahead) vehicle. The controller’s decision to accelerate or deceler...
-
Chapter
Advances in Privacy Preservation Technologies
The rapid development of information technology and the continuous evolution of new business paradigms and personalized services have promoted frequent cross-border, cross-system, and cross-ecosystem interacti...
-
Chapter
Privacy Computing Techniques
One of the core goals of privacy computing is to guide the research of privacy-preserving algorithms from the perspective of “computing,” and to continuously explore and iterate on the basic theory of privacy-...
-
Book
-
Chapter and Conference Paper
Traffic Analysis by Adversaries with Partial Visibility
Mixnets are a fundamental privacy enhancing technology in the context of anonymous communication that have been extensively studied in terms of a Global passive Adversary (GPA). However a more realistic advers...
-
Chapter and Conference Paper
Multi-objective Hydrologic Cycle Optimization for Integrated Container Terminal Scheduling Problem
This paper uses the multi-objective rep-guided hydrological cycle optimization (MORHCO) algorithm to solve the Integrated Container Terminal Scheduling (ICTS) Problem. To enhance the global search capability o...
-
Chapter
Log and Monitor All Access to System Components and Cardholder Data
The overview for section 10.x of PCI DSS v4.0 reads as follows:
-
Chapter
Support Information Security with Organizational Policies and Programs
While PCI is centered around protecting cardholder data (CHD), Requirement 12 is central to all data. Requirement 12 is about data and IT governance, which is relevant to any organization.
-
Chapter
Segmentation and Tokenization
Segmentation is one of the most misunderstood aspects of PCI compliance. Many people read too deeply into the DSS about segmentation. On page 12 of PCI DSS version 4, it states that segmentation of the CDE from t...
-
Chapter and Conference Paper
Designing a Digital Shadow for Pasture Management to Mitigate the Impact of Climate Change
Pasture is a said to be a natural feed to the animal. Pastures are maintained to ensure a good quality and quantity of the feed to get the best produce from the animals. Traditional ways of managing the pastur...
-
Chapter
A Brief History of PCI
Most people think that PCI began with the formation of the PCI Security Standards Council (PCI SSC) back in 2006, but the roots of PCI, in fact, go back to the late 1990s.
-
Chapter
Apply Secure Configurations to All System Components
While network security controls (NSCs) are discussed in Requirement 1, those NSCs and the rest of the systems and devices are covered in Requirement 2.