View All Book Series

BOOK SERIES


Security, Privacy, and Trust in Mobile Communications


About the Series

Similar to computers, mobile landscape is also facing various security and privacy related threats. Increasing demand of sophisticated handheld mobile devices including smartphones, tablets, and so forth, is making them an attractive target of security threats. Since these devices store confidential data of the end users, and exploitation of vulnerabilities of the underlying technologies can create a havoc on massive scale, it becomes inevitable to need to understand and address the threats associated with them and to analyze the level of trust that can be established for mobile communication scenarios.

This series will present emerging aspects of the mobile communication landscape, and focuses on the security, privacy, and trust issues in mobile communication based applications. It brings state-of-the-art subject matter for dealing with the issues associated with mobile and wireless networks. This series is targeted for researchers, students, academicians, and business professions in the field.

If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]

3 Series Titles

Per Page
Sort

Display
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures

Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures

1st Edition

B. B. Gupta, Pooja Chaudhary
March 05, 2020

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5,...

Smart Card Security: Applications, Attacks, and Countermeasures

Smart Card Security: Applications, Attacks, and Countermeasures

1st Edition

B.B. Gupta, Megha Quamara
August 27, 2019

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks...

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of...

AJAX loader