Cybersecurity, Cryptography, and Privacy Here all links to books and articles in proprietary digital libraries are “local” – each link will work on any campus with legitimate (level of) access to those libraries. The links to open-access items will work everywhere. For a more comfortable library visit, use Google Chrome and, while you are scrolling through the titles, always right-click on the selected item’s link to “Open link in new tab” – after you close the new tab, your cursor will be where you right-clicked. This section of the library was updated on 27 June 2015. For more information, right-click on: http://competitive-learning.org/Notes.pdf This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License (available at: http://creativecommons.org/licenses/by-nc-nd/3.0/). This work is free for personal and classroom use as is; you may not use this work for commercial purposes. Professor Joseph Vaisman Department of Computer Science and Engineering, NYU-Poly [email protected] Table of Contents Introduction to Information Security Cybersecurity Hacking and Penetration Testing Homeland Security and Cyber Warfare Managing Information Security Economics of Information Security and Privacy Information Hiding and Steganography Data Encryption Network Security Mobile Network Security Hardware Security RFID Security Sensor Network Security Internet of Things (IoT) Security Cloud Security Smart Grid Security Smart City Security Cyber-Physical Systems Security Biometrics Security Engineering Digital Forensics Risk Trust Professional Certifications Careers in Cybersecurity Programming Mathematics for Cryptography Cryptography History of Cryptology Alice and Bob in Cipherspace How to Share a Secret Anonymization Privacy and Identity Management Data Privacy E-Cash Security Science Additional Web Resources Legal Matters Reference Material Online Publications – Directly Odds & Ends Introduction to Information Security ======= Applied Information Security: A Hands-on Approach David Basin, Patrick Schaller, and Michael Schlapfer Springer, 2011, ISBN 978-3-642-24474-2 http://dx.doi.org/10.1007/978-3-642-24474-2 The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, Second Edition Jason Andress Elsevier, 2014, ISBN 978-0-12-800744-0 http://www.sciencedirect.com/science/book/9780128007440 Elements of Computer Security David Salomon Springer, 2010, ISBN 978-0-85729-006-9 http://dx.doi.org/10.1007/978-0-85729-006-9 Information Security: Principles and Practice, Second Edition Mark Stamp Wiley, 2011, ISBN 9781118027974 http://dx.doi.org/10.1002/9781118027974 Introduction to Information Security: A Strategic-based Approach Timothy J. Shimeall and Jonathan M. Spring Elsevier, 2014, ISBN 978-1-59749-969-9 http://www.sciencedirect.com/science/book/9781597499699 What Is Computer Science? – An Information Security Perspective Daniel Page and Nigel Smart Springer, 2014, ISBN 978-3-319-04042-4 http://dx.doi.org/10.1007/978-3-319-04042-4 Back to the Table of Contents ======================================= Cybersecurity ========================== Cyber Crime and Cyber Terrorism Investigator’s Handbook Babak Akhgar, Andrew Staniforth, and Francesca Bosco (Editors) Elsevier, 2014, ISBN 978-0-12-800743-3 http://www.sciencedirect.com/science/book/9780128007433 Cyber Reconnaissance, Surveillance and Defense Robert Shimonski Elsevier, 2015, ISBN 978-0-12-801308-3 http://www.sciencedirect.com/science/book/9780128013083 Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques Sudhanshu Chauhan and Nutan Kumar Panda Elsevier, 2015, ISBN 978-0-12-801867-5 http://www.sciencedirect.com/science/book/9780128018675 Cyber Security and IT Infrastructure Protection John R. Vacca (Editor) Elsevier, 2014, ISBN 978-0-12-416681-3 http://www.sciencedirect.com/science/book/9780124166813 Cyber Security: Deterrence and IT Protection for Critical Infrastructures Maurizio Martellini (Editor) Springer, 2013, ISBN 978-3-319-02279-6 http://dx.doi.org/10.1007/978-3-319-02279-6 Data Protection from Insider Threats Elisa Bertino Morgan & Claypool, 2012, ISBN 9781608457694 http://dx.doi.org/10.2200/S00431ED1V01Y201207DTM028 Detecting and Combating Malicious Email Julie JCH Ryan and Cade Kamachi Elsevier, 2015, ISBN 978-0-12-800110-3 http://www.sciencedirect.com/science/book/9780128001103 Emerging Trends in ICT Security Babak Akhgar and Hamid R. Arabnia (Editors) Elsevier, 2014, ISBN 978-0-12-411474-6 http://www.sciencedirect.com/science/book/9780124114746 How to Attack and Defend Your Website Henry Dalziel Elsevier, 2015, ISBN 978-0-12-802732-5 http://www.sciencedirect.com/science/book/9780128027325 Human Aspects of Information Security, Privacy, and Trust, First International Conference, HAS 2013 Louis Marinos and Ioannis Askoxylakis (Editors) Springer, 2013, ISBN 978-3-642-39345-7 http://dx.doi.org/10.1007/978-3-642-39345-7 Measuring and Communicating Security’s Value: A Compendium of Metrics for Enterprise Protection George Campbell Elsevier, 2015, ISBN 978-0-12-802841-4 http://www.sciencedirect.com/science/book/9780128028414 Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, and Jason L. Martin Elsevier, 2015, ISBN 978-0-12-800207-0 http://www.sciencedirect.com/science/book/9780128002070 Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware Aditya K. Sood and Richard Enbody Elsevier, 2014, ISBN 978-0-12-800604-7 http://www.sciencedirect.com/science/book/9780128006047 Towards Fundamental Science of Cyber Security Alexander Kott http://dx.doi.org/10.1007/978-1-4614-7597-2_1 Network Science and Cybersecurity Robinson E. Pino (Editor) Springer, 2014, ISBN 978-1-4614-7597-2 http://dx.doi.org/10.1007/978-1-4614-7597-2 The Psychology of Security Ryan West Communications of the ACM, Volume 51, Number 4 (April 2008) http://dx.doi.org/10.1145/1330311.1330320 Zen and the Art of Information Security Ira Winkler Elsevier, 2007, ISBN 978-1-59749-168-6 http://www.sciencedirect.com/science/book/9781597491686 Physical-Layer Security: From Information Theory to Security Engineering Matthieu Block and Joao Barros Cambridge University Press, 2011, ISBN 9780511977985 http://dx.doi.org/10.1017/CBO9780511977985 Analyzing and Defending Against Web-Based Malware Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, and Insup Lee ACM Computing Surveys, Volume 45, Number 4 (August 2013) http://dx.doi.org/10.1145/2501654.2501663 Botnets: A survey Sergio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto, and Ronaldo M. Salles Computer Networks, Volume 57, Number 2 (February 2013) http://dx.doi.org/10.1016/j.comnet.2012.07.021 Botnets Heli Tiirman-Klaar, Jan Gassen, Elmar Gerhards-Padilla, and Peter Martini Springer, 2013, ISBN 978-1-4471-5216-3 http://dx.doi.org/10.1007/978-1-4471-5216-3 Intelligent Systems for Security Informatics Christopher Yang, Wenji Mao, Xiaolong Zheng, and Hui Wang Elsevier, 2013, ISBN 978-0-12-404702-0 http://www.sciencedirect.com/science/book/9780124047020 Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization Eric Cole Elsevier, 2013, ISBN 978-1-59749-949-1 http://www.sciencedirect.com/science/book/9781597499491 Spyware and Adware John Aycock Springer, 2011, ISBN 978-0-387-77741-2 http://dx.doi.org/10.1007/978-0-387-77741-2 Identifying Malicious Code Through Reverse Engineering Abhishek Singh (Editor) Springer, 2009, ISBN 978-0-387-89468-3 http://dx.doi.org/10.1007/978-0-387-89468-3 SQL Injection Attacks and Defense, Second Edition Justin Clarke Elsevier, 2012, ISBN 978-1-59749-963-7 http://www.sciencedirect.com/science/book/9781597499637 Securing SQL Server: Protecting Your Database from Attacks, Third Edition Denny Cherry Elsevier, 2015, ISBN 978-0-12-801275-9 http://www.sciencedirect.com/science/book/9780128012758 Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure Derrick Rountree Elsevier, 2013, ISBN 978-1-59749-958-3 http://www.sciencedirect.com/science/book/9781597499583 Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions Thomas W. Shinder, Yuri Diogenes, and Debra Littlejohn Shinder Elsevier, 2013, ISBN 978-1-59749-980-4 http://www.sciencedirect.com/science/book/9781597499804 http://dx.doi.org/10.1016/B978-1-59749-980-4.09985-4 Investigating Computer-Related Crime, Second Edition Peter Stephenson and Keith Gilbert CRC Press, 2013, ISBN 978-1-4200-0370-3 http://dx.doi.org/10.1201/b14664 Cybercrimes: A Multidisciplinary Analysis Sumit Ghosh and Elliot Turrini Springer, 2010, ISBN 978-3-642-13547-7 http://dx.doi.org/10.1007/978-3-642-13547-7 RE’09: Security Requirements Engineering (special issue) Eric Dubois and Haralambos Mouratidis (Editors) Requirements Engineering, Volume 15, Number 1 (March 2010) http://link.springer.com/journal/766/15/1/ 6. Information Security Applications Based on Biomolecular Systems Guinevere Strack, Heather R. Lukarift, Glenn R. Johnson, and Evgeny Katz http://dx.doi.org/10.1002/9783527645480.ch6 Biomolecular Information Processing: From Logic Systems to Smart Sensors and Actuators Evgeny Katz (Editor) Wiley, 2012, ISBN 9783527645480 http://dx.doi.org/10.1002/9783527645480 Cyber Security Policy Guidebook Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, and Joseph Weiss Wiley, 2012, ISBN 9781118241530 http://dx.doi.org/10.1002/9781118241530 Cryptographic Protocol: Security Analysis Based on Trusted Freshness Ling Dong and Kefei Chen Springer, 2012, ISBN 978-3-642-24073-7 http://dx.doi.org/10.1007/978-3-642-24073-7 Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation Thomas Schneider Springer, 2012, ISBN 978-3-642-30042-4 http://dx.doi.org/10.1007/978-3-642-30042-4 Secure Multi-Party Non-Repudiation Protocols and Applications Jose A. Onieva, Javier Lopez, and Jianying Zhou Springer, 2009, ISBN 978-0-387-75630-1 http://dx.doi.org/10.1007/978-0-387-75630-1 Advances in Intelligence and Security Informatics Wenji Mao and Fei-Yue Wang Elsevier, 2012, ISBN 978-0-12 397200-2 http://www.sciencedirect.com/science/book/9780123972002 Balanced Secure Scan: Partial Scan Approach for Secret Information Protection Michiko Inoue, Tomokazu Yoneda, Mineo Hasegawa, and Hideo Fujiwara Journal of Electronic Testing, Volume 27, Number 2 (April 2011) http://dx.doi.org/10.1007/s10836-011-5204-0 Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats Bill Gardner and Valerie Thomas Elsevier, 2014, ISBN 978-0-12-419967-5 http://www.sciencedirect.com/science/book/9780124199675 Client-Side Attacks and Defense Robert Shimonski and Sean-Philip Oriyano Elsevier, 2012, ISBN 978-1-59749-590-5 http://www.sciencedirect.com/science/book/9781597495905 The Hacker’s Guide to OS X: Exploiting OS X from the Root Up Rob Bathurst, Russ Rogers, and Alijohn Ghassemlouei Elsevier, 2013, ISBN 978-1-59749-950-7 http://www.sciencedirect.com/science/book/9781597499507 Thor’s Microsoft Security Bible: A Collection of Practical Security Techniques Timothy “Thor” Mullen Elsevier, 2011, ISBN 978-1-59749-572-1 http://www.sciencedirect.com/science/book/9781597495721 Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development David Kleidermacher and Mike Kleidermacher Elsevier, 2012, ISBN 978-0-12-386886-2 http://www.sciencedirect.com/science/book/9780123868862 Security Basics for Computer Architects Ruby B. Lee Morgan & Claypool, 2013, ISBN 9781627051569 http://dx.doi.org/10.2200/S00512ED1V01Y201305CAC025 Game Theory Meets Network Security and Privacy Mohammad Hossein Manshael, Quanyan Zhu, Tansu Alpcan, Tamer Basar, and Jan-Pierre Hubaux ACM Computer Surveys, Volume 45, Number 3 (June 2013) http://dx.doi.org/10.1145/2480741.2480742 Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned Milind Tambe Cambridge University Press, 2012, ISBN 9780511973031 http://dx.doi.org/10.1017/CBO9780511973031 Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Eric Cole and Sandra Ring Elsevier, 2006, ISBN 978-1-59749-048-1 http://www.sciencedirect.com/science/book/9781597490481 Information Assurance and Security Education and Training: WISE 8, WISE 7, and WISE 6 Revised Selected Papers Ronald C. Dodge Jr. and Lynn Futcher (Editors) Springer, 2013, ISBN 978-3-642-39377-8 http://dx.doi.org/10.1007/978-3-642-39377-8 Rethinking computing insanity, practice and research Gene Spafford (December 15, 2008) http://www.cerias.purdue.edu/site/blog/post/rethinking_com puting_insanity_practice_and_research/ Perfect Password: Selection, Protection, Authentication Mark Burnett and Dave Kleiman Elsevier, 2005, ISBN 978-1-59749-041-2 http://www.sciencedirect.com/science/book/9781597490412 Online Security for the Business Traveler Deborah Gonzalez Elsevier, 2014, ISBN 978-0-12-800069-4 http://www.sciencedirect.com/science/book/9780128000694 Workshop Program 8th USENIX Workshop on Offensive Technologies, WOOT’14 https://www.usenix.org/conference/woot14/workshopprogram Back to the Table of Contents ======================================= Hacking and Penetration Testing ========== The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, Second Edition Patrick Engebretson Elsevier, 2013, ISBN 978-0-12-411644-3 http://www.sciencedirect.com/science/book/9780124116443 The Basics of Web Hacking: Tools and Techniques to Attack the Web Josh Pauli Elsevier, 2013, ISBN 978-0-12-416600-4 http://www.sciencedirect.com/science/book/9780124166004 Hacking and Penetration Testing with Low Power Devices Philip Polstra Elsevier, 2015, ISBN 978-0-12-800751-8 http://www.sciencedirect.com/science/book/9780128007518 Hacking Web Apps: Detecting and Preventing Web Applications Security Problems Mike Shema Elsevier, 2012, ISBN 978-1-59749-951-4 http://www.sciencedirect.com/science/book/9781597499514 Hacking with Kali: Practical Penetration Testing Techniques James Broad and Andrew Binder Elsevier, 2014, ISBN 978-0-12-407749-2 http://www.sciencedirect.com/science/book/9780124077492 Low Tech Hacking Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, and Sean Lowther Elsevier, 2012, ISBN 978-1-59749-665-0 http://www.sciencedirect.com/science/book/9781597496650 Professional Penetration Testing: Creating and Learning in a Hacking Lab, Second Edition Thomas Wilhelm Elsevier, 2013, ISBN 978-1-59749-993-4 http://www.sciencedirect.com/science/book/9781597499934 Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense Gavin Watson, Andrew Mason, and Richard Ackroyd Elsevier, 2014, ISBN 978-0-12-420124-8 http://www.sciencedirect.com/science/book/9780124201248 Wireless Reconnaissance in Penetration Testing Matthew Neely, Alex Hamerstone, and Chris Sanyk Elsevier, 2013, ISBN 978-1-59749-731-2 http://www.sciencedirect.com/science/book/9781597497312 Back to the Table of Contents ======================================= Homeland Security and Cyber Warfare ===== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Homeland Security: The Essentials Jane A. Bullock, George D. Haddow, and Damon P. Coppola Elsevier, 2013, ISBN 978-0-12-415803-0 http://www.sciencedirect.com/science/book/9780124158030 Introduction to Cyber-Warfare: A Multidisciplinary Approach Paolo Shakarian, Jana Shakarian, and Andrew Ruef Elsevier, 2013, ISBN 978-0-12-407814-7 http://www.sciencedirect.com/science/book/9780124078147 Cyber War, Cyber Space: National Security and Privacy in the Global Economy Panel: Steven Bellovin, Yvo Desmedt, Amir Hertzberg, and Bart Preneel; Moderator: Thomas Ferguson New Economic Thinking (2014) https://www.youtube.com/watch?v=Zzy0NT7vbxo ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization Eric Cole Elsevier, 2013, ISBN 978-1-59749-949-1 http://www.sciencedirect.com/science/book/9781597499491 Application of Big Data for National Security: A Practitioner’s Guide to Emerging Technologies Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia, Richard Hill, Andrew Staniforth, and Petra Saskia Bayerl (Editors) Elsevier, 2015, ISBN 978-0-12-801967-2 http://www.sciencedirect.com/science/book/9780128019672 The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice Steve Winterfeld and Jason Andress Elsevier, 2013, ISBN 978-0-12-404737-2 http://www.sciencedirect.com/science/book/9780124047372 Counterterrorism and Cybersecurity: Total Information Awareness Newton Lee Springer, 2013, ISBN 978-1-4614-7205-6 http://dx.doi.org/10.1007/978-1-4614-7205-6 Cyber Crime and Cyber Terrorism Investigator’s Handbook Babak Akhgar, Andrew Staniforth, and Francesca Bosco (Editors) Elsevier, 2014, ISBN 978-0-12-800743-3 http://www.sciencedirect.com/science/book/9780128007433 Cyberterrorism: Understanding, Assessment, and Response Thomas M. Chen, Lee Jarvis, and Stuart Macdonald (Editors) Springer, 2014, ISBN 978-1-4939-0962-9 http://dx.doi.org/10.1007/978-1-4939-0962-9 Cyber Warfare: Building the Scientific Foundation Sushil Jajodia, Paulo Shakarian, V.S. Subrahmanian, Vipin Swarup, and Cliff Wang (Editors) Springer, 2015, ISBN 978-3-319-14039-1 http://dx.doi.org/10.1007/978-3-319-14039-1 Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners, Second Edition Jason Andress and Steve Winterfeld Elsevier, 2014, ISBN 978-0-12-416672-1 http://www.sciencedirect.com/science/book/9780124166721 Cyber Warfare and the Laws of War Heather Harrison Dinniss Cambridge University Press, 2013, ISBN 9780511894527 http://dx.doi.org/10.1017/CBO9780511894527 Handbook of Computational Approaches to Counterterrorism V.S. Subrahmanian (Editor) Springer, 2013, ISBN 978-1-4614-5311-6 http://dx.doi.org/10.1007/978-1-4614-5311-6 Intelligent Methods for Cyber Warfare Ronald R. Yager, Marek Z. Reformat, and Naïf Alajlan (Editors) Springer, 2015, ISBN 978-3-319-08624-8 http://dx.doi.org/10.1007/978-3-319-08624-8 Strategic Intelligence Management: National Security Imperatives and Information and Communication Technologies Babak Akhgar and Simeon Yates (Editors) Elsevier, 2013, ISBN 978-0-12-407191-9 http://www.sciencedirect.com/science/book/9780124071919 Back to the Table of Contents ======================================= Managing Information Security =========== Building an Intelligence-Led Security Program Allan Liska Elsevier, 2015, ISBN 978-0-12-802145-3 http://www.sciencedirect.com/science/book/9780128021453 Designing and Building A Security Operations Center David Nathans Elsevier, 2015, ISBN 978-0-12-800899-7 http://www.sciencedirect.com/science/book/9780128008997 How to Cheat at Managing Information Security Mark Osborne Elsevier, 2006, ISBN 978-1-59749-110-5 http://www.sciencedirect.com/science/book/9781597491105 The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web Ron Lepofsky Springer, 2014, ISBN 978-1-4842-0148-0 http://dx.doi.org/10.1007/978-1-4842-0148-0 Managing Information Security, Second Edition John R. Vacca (Editor) Elsevier, 2014, ISBN 978-0-12-416688-2 http://www.sciencedirect.com/science/book/9780124166882 Security Planning: An Applied Approach Susan Lincke Springer, 2015, ISBN 978-3-319-16027-6 http://dx.doi.org/10.1007/978-3-319-16027-6 Back to the Table of Contents ======================================= Economics of Information Security and Privacy ======================================= Blackhatonomics: An Inside Look at the Economics of Cybercrime Will Gragido, Daniel Molina, John Pirc, and Nick Selby Elsevier, 2013, ISBN 978-1-59749-740-4 http://www.sciencedirect.com/science/book/9781597497404 Economics of Information Security and Privacy Tyler Moore, David J. Pym, and Christos Ioannidis (Editors) Springer, 2010, ISBN 978-1-4419-6967-5 http://dx.doi.org/10.1007/978-1-4419-6967-5 The Economics of Information Security and Privacy Rainer Bohme (Editor) Springer, 2013, ISBN 978-3-642-39498-0 http://dx.doi.org/10.1007/978-3-642-39498-0 Economics of Information Security and Privacy III Bruce Schneier (Editor) Springer, 2013, ISBN 978-1-4614-1981-5 http://dx.doi.org/10.1007/978-1-4614-1981-5 Back to the Table of Contents ======================================= Information Hiding and Steganography ===== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Hide and Seek: An Introduction to Steganography Niels Provos and Peter Honeyman IEEE Security & Privacy, Volume 1, Number 3 (May-June 2003) http://niels.xtdnet.nl/papers/practical.pdf Chapter 2 – An Overview of Steganography Gary C. Kessler and Chet Hosmer Advances in Computers, Volume 83 Elsevier, 2011, ISBN 978-0-12-385510-7 http://dx.doi.org/10.1016/B978-0-12-385510-7.00002-3 Current status and key issues in image steganography: A survey Mansi S. Subhedar and Vijay H. Mankar Computer Science Review, Volumes 13-14 (November 2014) http://dx.doi.org/10.1016/j.cosrev.2014.09.001 Trends in Steganography Elzbieta Zielinska, Wojciech Mazurczyk, and Krzysztof Szczypiorski Communications of the ACM, Volume 57, Number 3 (March 2014) http://dx.doi.org/10.1145/2566590.2566610 Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols Michael Raggo and Chet Hosmer Elsevier, 2013, ISBN 978-1-59749-743-5 http://www.sciencedirect.com/science/book/978159749 7435 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Cyber Warfare: Steganography vs. Steganalysis Huaiqing Wang and Shuozhong Wang Communications of the ACM, Volume 47, Number 10 (October 2004) http://dx.doi.org/10.1145/1022594.1022597 Digital image steganography: Survey and analysis of current methods Abbas Cheddad, Joan Condelll, Kevin Curran, and Paul Mc Kevitt Signal Processing, Volume 90, Number 3 (2010) http://dx.doi.org/10.1016/j.sigpro.2009.08.010 Disappearing Cryptography – Information Hiding: Steganography & Watermarking, Third Edition Peter Wayner Elsevier, 2009, ISBN 978-0-12-374479-1 http://www.sciencedirect.com/science/book/9780123744791 Information Hiding: First International Workshop Ross Anderson (Editor) Springer, 1996, ISBN 978-3-540-49589-5, LNCS 1174 http://dx.doi.org/10.1007/3-540-61996-8 Information Hiding: 14th International Conference, IH 2012 Matthias Kirchner and Dipak Ghosal (Editor) Springer, 2013, ISBN 978-3-642-36373-3, LNCS 7692 http://dx.doi.org/10.1007/978-3-642-36373-3 Information Hiding in Speech Signals for Secure Communication Wu Zhijun Elsevier, 2015, ISBN 978-0-12-801328-1 http://www.sciencedirect.com/science/book/9780128013281 Information Hiding: Steganography and Watermarking – Attacks and Countermeasures Neil F. Johnson, Zoran Duric, and Sushil Jajodia Springer, 2001, ISBN 978-1-4615-4375-6 http://dx.doi.org/10.1007/978-1-4615-4375-6 The prisoner’s problem and the subliminal channel Gustavus J. Simmons http://dx.doi.org/10.1007/978-1-4684-4730-9_5 Advances in Cryptology: Proceedings of Crypto 83 David Chaum (Editor) Springer, 1984, ISBN 978-1-4684-4730-9 http://dx.doi.org/10.1007/978-1-4684-4730-9 Back to the Table of Contents ======================================= Data Encryption ======================== Digital Signatures Jonathan Katz Springer, 2010, ISBN 978-0-387-27712-7 http://dx.doi.org/10.1007/978-0-387-27712-7 Electronic Postage Systems: Technology, Security Economics Gerrit Bleumer Springer, 2007, ISBN 978-0-387-44606-6 http://dx.doi.org/10.1007/978-0-387-44606-6 Functional Encryption: A New Vision for Public-Key Cryptography Dan Boneh, Amit Sahai, and Brent Waters Communications of the ACM, Volume 55, Number 11 (November 2012) http://dx.doi.org/10.1145/2366316.2366333 Identity-Based Encryption Sanjit Chatterjee and Palash Sarkar Springer, 2011, ISBN 978-1-4419-9383-0 http://dx.doi.org/10.1007/978-1-4419-9383-0 Practical Signcryption Alexander W. Dent and Yuliang Zheng (Editors) Springer, 2010, ISBN 978-3-540-89411-7 http://dx.doi.org/10.1007/978-3-540-89411-7 Simple Steps to Data Encryption: A Practical Guide to Secure Computing Peter Loshin Elsevier, 2013, ISBN 978-0-12-411483-8 http://www.sciencedirect.com/science/book/9780124114838 Back to the Table of Contents ======================================= Network Security ======================= Also see: Telecommunications and Networking shelf in the Information Technology … section; Sensor Networks shelf in the Information Technology … section. Guide to Computer Network Security, Third Edition Joseph Migga Kizza Springer, 2015, ISBN 978-1-4471-6654-2 http://dx.doi.org/10.1007/978-1-4471-6654-2 Network and System Security, Second Edition John R. Vacca (Editor) Elsevier, 2014, ISBN 089-0-12-416689-9 http://www.sciencedirect.com/science/book/9780124166899 Emerging Trends in ICT Security Babak Akhgar and Hamid R. Arabnia (Editors) Elsevier, 2014, ISBN 978-0-12-411474-6 http://www.sciencedirect.com/science/book/9780124114746 Dynamic Secrets in Communication Security Sheng Xiao, Weibo Gong, and Don Towsley Springer, 2014, ISBN 978-1-4614-7831-7 http://dx.doi.org/10.1007/978-1-4614-7831-7 Securing VoIP: Keeping Your VoIP Network Safe Regis J. (Bud) Bates Elsevier, 2015, ISBN 978-0-12-417039-1 http://www.sciencedirect.com/science/book/9780124170391 Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems Y.-W. Peter Hong, Pang-Chang Lan, and C.-C. Jay Kuo Springer, 2014, ISBN 978-981-4560-14-6 http://dx.doi.org/10.1007/978-981-4560-14-6 Chapter 1 Introduction to UTM (Unified Threat Management) http://dx.doi.org/10.1016/B978-1-59-749747-3.00001-6 UTM Security with Fortinet: Mastering FortiOS Kenneth Tam, Martin H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, and Josh More Elsevier, 2013, ISBN 978-1-59749-747-3 http://www.sciencedirect.com/science/book/9781597497473 The Death of the Internet Markus Jacobsson (Editor) Wiley, 2012, ISBN 9781118312551 http://dx.doi.org/10.1002/9781118312551 Applied Network Security Monitoring: Collection, Detection, and Analysis Chris sanders and Jason Smith Elsevier, 2014, ISBN 978-0-12-417208-1 http://www.sciencedirect.com/science/book/9780124172081 Network Intrusion Detection and Prevention: Concepts and Techniques Ali A. Ghorbani, Wei Lu, and Mahbod Tavallaee Springer, 2010, ISBN 978-0-387-88771-5 http://dx.doi.org/10.1007/978-0-387-88771-5 Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response Joe Fichera and Steven Bolt Elsevier, 2013, ISBN 978-1-59749-962-0 http://www.sciencedirect.com/science/book/9781597499620 Network Hardening: An Automated Approach to Improving Network Security Lingyu Wang, Massimiliano Albanese, and Sushil Jajodia Springer, 2014, ISBN 978-3-319-04612-9 http://dx.doi.org/10.1007/978-3-319-04612-9 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Security and Privacy Protection in Visual Sensor Networks: A Survey Thomas Winkler and Bernhard Rinner ACM Computing Surveys, Volume 47, Number 1 (July 2014) http://dx.doi.org/10.1145/2545883 Back to the Table of Contents ======================================= Sensor Network Security ================= Security for Wireless Sensor Networks using Identity-Based Cryptography Harsh Kupwade Patil and Stephen A. Szygenda CRC Press, 2013, ISBN 978-1-4398-6902-4 http://dx.doi.org/10.1201/b13080 Back to the Table of Contents ======================================= Mobile Network Security ================ Identifying back doors, attack points, and surveillance mechanisms in iOS devices Jonathan Zdziarski Digital Investigation, Volume 11, Number 1 (March 2014) http://dx.doi.org/10.1016/j.diin.2014.01.001 Mobile Authentication: Problems and Solutions Markus Jacobson Springer, 2013, ISBN 978-1-4614-4878-5 http://dx.doi.org/10.1007/978-1-4614-4878-5 Security in Mobile Wireless Networks (special issue) Abderrahim Benslimane, Chadi Assi, Fred Nen-Fu Huang, and Stamatios V. Kartapoulos (Editors) Security and Telecommunications Networks, Volume 3, Numbers 2-3 (March-June 2010) http://dx.doi.org/10.1002/sec.142 Software Test Attacks to Break Mobile and Embedded Devices Jon Duncan Hagar CRC Press, 2014, ISBN 978-1-4665-7531-8 http://www.crcnetbase.com/doi/book/10.1201/b15526 Trustworthy Execution on Mobile Devices Amit Vasudevan, Jonathan M. McCune, and James Newsome Springer, 2014, ISBN 978-1-4614-8190-4 http://dx.doi.org/10.1007/978-1-4614-8190-4 Wireless Mobile Internet Security, Second Edition Man Young Rhee Wiley, 2013, ISBN 9781118512920 http://dx.doi.org/10.1002/9781118512920 Back to the Table of Contents ======================================= Hardware Security ====================== Rethinking Computers for Cybersecurity Ruby B. Lee Computer, Volume 48, Number 4 (April 2015) http://dx.doi.org/10.1109/MC.2015.118 Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits Eric Peeters Springer, 2013, ISBN 978-1-4614-6783-0 http://dx.doi.org/10.1007/978-1-4614-6783-0 Hardware Security: Design, Threats, and Safeguards Debdeep Mukhapadhyay and Rajat Subhra Chakraborty CRC Press, 2015, ISBN 978-1-4398-9584-9 http://dx.doi.org/10.1201/b17555 Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection Mohammad Tehranipoor, Hassan Salmani, and Xuehui Zhang Springer, 2014, ISBN 978-3-319-00816-5 http://dx.doi.org/10.1007/978-3-319-00816-5 Introduction to Hardware Security and Trust Mohammad Tehranipoor and Cliff Wang (Editors) Springer, 2012, ISBN 9781-4419-8080-9 http://dx.doi.org/10.1007/978-1-4419-8080-9 Physical Unclonable Functions in Theory and Practice Christoph Bohm and Maximilian Hofer Springer, 2013, ISBN 978-1-4614-5040-5 http://dx.doi.org/10.1007/978-1-4614-5040-5 Secure Smart Embedded Devices, Platforms and Applications Konstantinos Markantonakis and Keith Mayes (Editors) Springer, 2014, ISBN 978-1-4614-7915-4 http://dx.doi.org/10.1007/978-1-4614-7915-4 A Survey of Security Issues in Hardware Virtualization Gabor Pek, Levente Buttyan, and Boldizsar Bencsath ACM Computing Surveys, Volume 45, Number 3 (June 2013) http://dx.doi.org/10.1145/2480741.2480757 Trustworthy Reconfigurable Systems: Enhancing the Security Capabilities of Reconfigurable Hardware Architectures Thomas Feller Springer, 2014, ISBN 978-3-658-07005-2 http://dx.doi.org/10.1007/978-3-658-07005-2 Back to the Table of Contents ======================================= RFID Security ========================== Also see: RFID shelf in the Information Technology, … section. Classifying RFID attacks and defenses Aikaterini Mitrokotsa, Melanie R. Rieback, and Andrew S. Tanenbaum Information Systems Frontiers, Volume 12, Number 5 (November 2010) http://dx.doi.org/10.1007/s10796-009-9210-z The Evolution of RFID Security Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum http://dx.doi.org/10.1109/MPRV.2006.17 IEEE Pervasive Computing, Volume 5, Number 1 (January-March 2006) Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting Peter H. Cole and Damith C. Ranasinghe Springer, 2008, ISBN 978-3-540-71641-9 http://dx.doi.org/10.1007/978-3-540-71641-9 RFID Security: Techniques, Protocols and System-on-Chip Design Paris Kitsos and Yan Zhang (Editors) Springer, 2008, ISBN 978-0-387-76481-8 http://dx.doi.org/10.1007/978-0-387-76481-8 RFID Security and Privacy Yingjiu Li, Robert H. Deng, and Elisa Bertino Morgan & Claypool, 2014, ISBN 9781627053266 http://dx.doi.org/10.2200/S00550ED1V01Y201311SPT007 RFID Security & Privacy Lounge Information Security Group, Universite catholique de Louvain http://www.avoine.net/rfid/ Back to the Table of Contents ======================================= Internet of Things (IoT) Security =========== Also see: Internet of Things (IoT) shelf in the Information Technology, … section. The Internet of Things Has Arrived – And So Have Massive Security Issues Andrew Rose (January 11, 2013) http://www.wired.com/opinion/2013/01/securing-theinternet-of-things/ Can You Trust Your Fridge? Alan Grau IEEE Spectrum, Volume 52, Number 3 (March 2015) http://dx.doi.org/10.1109/MSPEC.2015.7049440 Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing Vivek Kumar Sehgal, Anubhav Patrick, Ashutosh Soni, and Lucky Rajput http://dx.doi.org/10.1007/978-3-319-11227-5_22 Classification Mechanism for IoT Devices towards Creating a Security Framework V.J. Jincy and Sudharsan Sundararajan http://dx.doi.org/10.1007/978-3-319-11227-5_23 Intelligent Distributed Systems Rajkumar Buyya and Sabu M. Thampi (Editors) Springer, 2015, ISBN 978-3-319-11227-5 http://dx.doi.org/10.1007/978-3-319-11227-5 On the features and challenges of security and privacy in distributed internet of things Rodrigo Roman, Jianying Zhou, and Javier Lopez Computer Networks, Volume 57, Number 10 (5 July 2013) http://dx.doi.org/10.1016/j.comnet.2012.12.018 Security, privacy and trust in Internet of Things: The road ahead S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini Computer Networks, Volume 76, (15 January 2015) Pages 146-164 http://dx.doi.org/10.1016/j.comnet.2014.11.008 A survey on trust management for Internet of Things Zheng Yan, Pen Zhang, and Athanasios V. Vasilakos Journal of Network and Computer Applications, Volume 42 (2014) http://dx.doi.org/10.1016/j.jnca.2014.01.014 Back to the Table of Contents ======================================= Cloud Security ========================= Also see: the Virtualization and Cloud Computing shelf in the Information Technology, … section. Cloud Computing Security: A Survey Issa M. Khalil, Abdallah Khreishah, and Muhammad Azeem Computers, Volume 3, Number 1 (February 2014) http://dx.doi.org/10.3390/computers3010001 A survey on securing the virtual cloud Robert Denz and Stephen Taylor Journal of Cloud Computing, Volume 2 (December 2013) http://dx.doi.org/10.1186/2192-113X-2-17 Virtual machine introspection: towards bridging the semantic gap Asit More and Shashikala Tapaswi Journal of Cloud Computing, Volume 3 (December 2014) http://dx.doi.org/10.1186/s13677-014-0016-2 Cloud Management and Security Imad M. Abbadi Wiley, 2014, ISBN 9781118817087 http://dx.doi.org/10.1002/9781118817087 Cloud Security: A Gathering Storm Mihir Nanavati, Patrick Colp, Bill Aiello, and Andrew Warfield Communications of the ACM, Volume 57, Number 5 (May 2014) http://dx.doi.org/10.1145/2593686 The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues Ryan Ko and Kim-Kwang Raymond Choo (Editors) Elsevier, 2015, ISBN 978-0-12-801595-7 http://www.sciencedirect.com/science/book/9780128015957 Secure the Cloud: From the Perspective of a Service-Oriented Organization Arpan Roy, Santonu Sarkar, Rajeshwari Ganesan, and Geetika Goel ACM Computing Surveys, Volume 47, Number 3 (April 2015) http://dx.doi.org/10.1145/2693841 CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security Raj Samani, Brian Honan, and Jim Reavis Elsevier, 2015, ISBN 978-0-12-420125-5 http://www.sciencedirect.com/science/book/9780124201255 Security and Privacy in Cloud Computing: A Survey Mahesh U. Shankarwar and Ambika V. Pawar http://dx.doi.org/10.1007/978-3-319-12012-6_1 Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, Volume 2 Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Ugata, and J.K. Mandal (Editors) Springer, 2015, ISBN 978-3-319-12012-6 http://dx.doi.org/10.1007/978-3-319-12012-6 Securing the Cloud: Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Elsevier, 2011, ISBN 978-1-59749-592-9 http://www.sciencedirect.com/science/book/9781597495929 Privacy and Security for Cloud Computing Siani Pearson and George Yee (Editors) Springer, 2013, ISBN 978-1-4471-4189-1 http://dx.doi.org/10.1007/978-1-4471-4189-1 Building the Infrastructure for Cloud Security: A Solutions View Raghu Yeluri and Enrique Castro-Leon Springer, 2014, ISBN 978-1-4302-6146-9 http://dx.doi.org/10.1007/978-1-4302-6146-9 Collaboration with Cloud Computing: Security, Social Media, and Unified Communication Ric Messier Elsevier, 2014, ISBN 978-0-12-417040-7 http://www.sciencedirect.com/science/book/9780124170407 Secure Cloud Computing Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang (Editors) Springer, 2014, ISBN 978-1-4614-9278-8 http://dx.doi.org/10.1007/978-1-4614-9278-8 High Performance Cloud Auditing and Applications Keesook J. Han, Baek-Young Choi, and Sejun Song (Editors) Springer, 2014, ISBN 978-1-4614-3296-8 http://dx.doi.org/10.1007/978-1-4614-3296-8 Security for Cloud Storage Systems Kan Yang and Xiaohua Jia Springer, 2014, ISBN 978-1-4614-7873-7 http://dx.doi.org/10.1007/978-1-4614-7873-7 Back to the Table of Contents ======================================= Smart Grid Security ===================== Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure Eric D. Knapp and Raj Samani Elsevier, 2013, ISBN 978-1-59749-998-9 http://www.sciencedirect.com/science/book/9781597499989 Cyber Security for Smart Grid Communications: Part I (special Issue) Rose Qingyang Hu, Yi Qian, Hsiao-Hwa Chen, and Hussein T. Mouftah (Editors) IEEE Communications Magazine, Volume 50, Number 8 (August 2012) http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=625751 4 Cyber Security for Smart Grid Communications: Part II (special Issue) Rose Qingyang Hu, Yi Qian, Hsiao-Hwa Chen, and Hussein T. Mouftah (Editors) IEEE Communications Magazine, Volume 51, Number 1 (August 2013) http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=640042 7 Back to the Table of Contents ======================================= Smart City Security ===================== Also see: Smart City shelf in the Information Technology … section. Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space Antti Evesti, Jani Suomalainen, and Eila Ovaska Computers, Volume 2, Number 1 (March 2013) http://dx.doi.org/10.3390/computers2010034 Invited Paper: VANET Security: Going Beyond Cryptographic-Centric Solutions Dhavy Gantsou http://dx.doi.org/10.1007/978-981-287-158-9_4 Attack on Security Goals (Confidentiality, Integrity, Availability) in VANET: A Survey Irshad Ahmed Sumra, Halabi Bin Hasbullah, and Jamalul-lail Bin AbManan http://dx.doi.org/10.1007/978-981-287-158-9_5 Vehicular Ad-hoc Networks for Smart Cities: First International Workshop, 2014 Anis Laouiti, Amir Qayyum, and Mohamad Naufal Mohamad Saad (Editors) Springer, 2015, ISBN 978-981-287-158-9 http://dx.doi.org/10.1007/978-981-287-158-9 Back to the Table of Contents ======================================= Cyber-Physical Systems Security =========== Aligning Cyber-Physical System Safety and Security Giedre Sabaliauskaite and Aditya P. Mathur http://dx.doi.org/10.1007/978-3-319-12544-2_4 Complex Systems Design & Management Asia: CSD&M Asia 2014 Michel_Alexandre Cardin, Daniel Krob, Pao Chuen Lui, Yang How Tan, and Kristin Wood (Editors) Springer, 2015, ISBN 978-3-319-12544-2 http://dx.doi.org/10.1007/978-3-319-12544-2 Applied Cyber-Physical Systems Sang C. Suh, U. John Tanik, John N. Carbone, and Abdullah Eroglu (Editors) Springer, 2014, ISBN 978-1-4614-7336-7 http://dx.doi.org/10.1007/978-1-4614-7336-7 Cyber-Physical Attacks: A Growing Invisible Threat George Lukas Elsevier, 2015, ISBN 978-0-12-801290-1 http://www.sciencedirect.com/science/book/9780128012901 Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges Sajal K. das, Krishna Kant, and Nan Zhang Elsevier, 2012, ISBN 978-0-12-415815-3 http://www.sciencedirect.com/science/book/9780124158153 Security and Privacy for Implantable Medical Devices Wayne Burleson and Sandro Carrara (Editors) Springer, 2014, ISBN 978-1-4614-1674-6 http://dx.doi.org/10.1007/978-1-4614-1674-6 Back to the Table of Contents ======================================= Biometrics ============================ Security Impact of High Resolution Smartphone Cameras Tobias Fiebig, Jan Krissler, and Ronny Hansch 8th USENIX Workshop on Offensive Technologies, WOOT’14 https://www.usenix.org/conference/woot14/workshopprogram/presentation/fiebig German minister photo fingerprint ‘theft’ seemed far too EASY, wail securobods: Security industry fear after apparent digit sig nickery John Leyden (30 December 2014) The Register http://www.theregister.co.uk/2014/12/30/hacking_fingerprint s_get_a_hires_pic_and_commercial_software/ Encyclopedia of Biometrics Stan Z. Li and Anil K. Jain (Editors) Springer, Live Reference – Constantly updated, ISBN 978-3-642-27733-7 http://dx.doi.org/10.1007/978-3-642-27733-7 Encyclopedia of Cryptography and Security Henk C.A. van Tilborg and Sushil Jajodia (Editors) Springer, 2011, ISBN 978-1-4419-5906-5 http://dx.doi.org/10.1007/978-1-4419-5906-5 Introduction to Biometrics Anil K. Jain, Arun A. Ross, and Karthik Nandakumar Springer, 2011, ISBN 978-0-387-77325-4 http://dx.doi.org/10.1007/978-0-387-77326-1 Practical Biometrics: From Aspiration to Implementation, Second Edition Julian Ashbourn Springer, 2015, ISBN 978-1-4471-6717-4 http://dx.doi.org/10.1007/978-1-4471-6717-4 Biometrics in the New World: The Cloud, Mobile Technology and Pervasive Identity Julian Ashbourn Springer, 2014, ISBN 978-3-319-04159-9 http://dx.doi.org/10.1007/978-3-319-04159-9 Guide to Biometrics for Large-Scale Systems: Technological, Operational, and User-Related Factors Julian Ashbourn Springer, 2011, ISBN 978-0-85729-467-8 http://dx.doi.org/10.1007/978-0-85729-467-8 Touchless Palmprint Recognition Systems Angelo Genovese, Vincenzo Piuri, and Fabio Scotti Springer, 2014, ISBN 978-3-319-10365-5 http://dx.doi.org/10.1007/978-3-319-10365-5 Implementation and evaluation of a remote authentication system using touchless palmprint recognition Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito, Yutaka Miyake, and Takafumi Aoki Multimedia Systems, Volume 19, Number 2 (2013) http://dx.doi.org/10.1007/s00530-012-0283-z Iris Biometrics: From Segmentation to Template Security Christian Rathgeb, Andreas Uhl, and Peter Wild Springer, 2013, ISBN 978-1-4614-5571-4 http://dx.doi.org/10.1007/978-1-4614-5571-4 Iris Biometric Model for Network Access Franjieh El Khoury CRC Press, 2013, ISBN 978-1-4665-0214-7 http://dx.doi.org/10.1201/b14817 A Survey of Ear Biometrics Ayman Abaza, Arun Ross, Christina Hebert, Mary Ann F. Harrison, and Mark S. Nixon ACM Computing Surveys, Volume 45, Number 2 (February 2013) http://dx.doi.org/10.1145/2431211.2431221 Transparent User Authentication: Biometrics, RFID and Behavioral Profiling Nathan Clarke Springer, 2011, ISBN 978-0-85729-805-8 http://dx.doi.org/10.1007/978-0-85729-805-8 Multibiometrics for Human Identification Bir Bhanu and Venu Govindraju (Editors) Cambridge University Press, 2011, ISBN 9780511921056 http://dx.doi.org/10.1017/CBO9780511921056 Chapter 13 Behavioral, Cognitive and Virtual Biometrics Roman V. Yampolskiy http://dx.doi.org/10.1007/978-0-85729-994-9_13 Computer Analysis of Human Behavior Albert Ali Salah and Theo Gevers (Editors) Springer, 2011, ISBN 978-0-85729-994-9 http://dx.doi.org/10.1007/978-0-85729-994-9 Enhancing Information Security and Privacy by Combining Biometrics with Cryptography Sanjay G. Kanade, Dijana Petrovska-Delacretaz, and Bernadette Dorizzi Morgan & Claypool, 2012, ISBN 9781608458486 http://dx.doi.org/10.2200/S00417ED1V01Y201205SPT003 Security and Privacy in Biometrics Patrizio Campisi (Editor) Springer, 2013, ISBN 978-1-4471-5230-9 http://dx.doi.org/10.1007/978-1-4471-5230-9 Biometrics: Algorithms and Applications (special issue) Proceedings of the IEEE, Volume 94, Number 11 (November 2006) http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=405246 3 Back to the Table of Contents ======================================= Security Engineering ==================== Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance Stuart Jacobs Wiley, 2011, ISBN 978-0-470-94791-3 http://dx.doi.org/10.1002/9780470947913 Chapter 1 - System Security Engineering for Information Systems Logan O. Mailloux, Michael R. Grimaila, John M. Colombi, Douglas D. Hodson, and Gearld Baumgartner http://dx.doi.org/10.1016/B978-0-12-411474-6.00001-3 Emerging Trends in ICT Security Babak Akhgar and Hamid R. Arabnia (Editors) Elsevier, 2014, ISBN 978-0-12-411474-6 http://www.sciencedirect.com/science/book/9780124114746 Chapter 3 - Advances in Model-Driven Security Levi Lucio, Qin Zhang, Phu H. Nguyen, Moussa Amrani, Jacques Klein, Hans Vangheluwe, and Yves Le Traon http://dx.doi.org/10.1016/B978-0-12-800162-2.00003-8 Advances in Computers, Volume Ninety Three Atif Memon (Editor) Elsevier, 2014, ISBN 978-0-12-800162-2 Virtualization: Issues, Security Threats, and Solutions Michael Pearce, Sherali Zeadally, and Ray Hunt ACM Computing Surveys, Volume 45, Number 2 (February 2013) http://dx.doi.org/10.1145/2431211.2431216 Security Engineering for Service-Oriented Architectures Michael Hafner and Ruth Breu Springer, 2009, ISBN 978-3-540-79539-1 http://dx.doi.org/10.1007/978-3-540-79539-1 Security Engineering with Patterns: Origins, Theoretical Model, and New Applications Markus Schumacher Springer, 2003, ISBN 978-3-540-45180-8 http://dx.doi.org/10.1007/b11930 Certificate Transparency Ben Laurie http://dx.doi.org/10.1145/2659897 Security Collapse in the HTTPS Market Axel Arnbak, Hadi Asghari, Michel Van Eeten, and Nico van Eijk http://dx.doi.org/10.1145/2660574 Why Is It Taking So Long to Secure Internet Routing? Sharon Goldberg http://dx.doi.org/10.1145/2659899 Communications of the ACM, Volume 57, Number 10 (October 2014) http://dl.acm.org/citation.cfm?id=2661061 Physical-Layer Security: From Information Theory to Security Engineering Matthieu Bloch and Joao Barros Cambridge University Press, 2011, ISBN 9780511977985 http://dx.doi.org/10.1017/CBO9780511977985 Back to the Table of Contents ======================================= Digital Forensics ======================== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Digital Forensics Simson L. Garfinkel American Scientist, Volume 100, Number 5 (September-October 2013) http://www.americanscientist.org/issues/feature/2013/5/digit al-forensics The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics, Second Edition John Sammons Elsevier, 2015, ISBN 978-0-12-801635-0 http://www.sciencedirect.com/science/book/9780128016350 2 SM Official (ISC) ® Guide to the CCFP CBK®: SM CCFP – Certified Cyber Forensics Professional Peter Stephenson (Editor) CRC Press, 2014, ISBN 978-1-4822-6248-3 http://dx.doi.org/10.1201/b17066 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ How to Defeat Advanced Malware: New Tools for Protection and Forensics Henry Dalziel Elsevier, 2015, ISBN 978-0-12-802731-8 http://www.sciencedirect.com/science/book/9780128027318 Python Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology Chet Hosmer Elsevier, 2014, ISBN 978-0-12-418676-7 http://www.sciencedirect.com/science/book/9780124186767 Unified Communications Forensics: Anatomy of Common UC Attacks Nicholas Grant & Joseph W Shaw II Elsevier, 2014, ISBN 978-1-59749-992-7 http://www.sciencedirect.com/science/book/9781597499927 Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Todd G. Shipley and Art Bowker Elsevier, 2014, ISBN 978-0-12-407817-8 http://www.sciencedirect.com/science/book/9780124078178 Cloud Storage Forensics Darren Quick, Ben Martini, and Kim-Kwang Raymond Choo Elsevier, 2014, ISBN 978-0-12-419970-5 http://www.sciencedirect.com/science/book/9780124199705 CyberForensics: Understanding Information Security Investigations Jennifer Bayuk (Editor) Springer, 2010, ISBN 978-1-60761-772-3 http://dx.doi.org/10.1007/978-1-60761-772-3 Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Brett Shavers Elsevier, 2013, ISBN 978-1-59749-985-9 http://www.sciencedirect.com/science/book/9781597499859 Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response Leighton R. Johnson III Elsevier, 2014, ISBN 978-1-59749-996-5 http://www.sciencedirect.com/science/book/9781597499965 X-Ways Forensics Practitioner’s Guide Brett Shavers and Eric Zimmerman Elsevier, 2014, ISBN 978-0-12-411605-4 http://www.sciencedirect.com/science/book/9780124116054 Digital Image Forensics: There is More to a Picture than Meets the Eye Husrev Taha Sencar and Nasir Memon (Editors) Springer, 2013, ISBN 978-1-4614-0757-7 http://dx.doi.org/10.1007/978-1-4614-0757-7 Investigative Computer Forensics: The Practical Guide for Lawyers, Accountants, Investigators, and Business Executives Erik Laykin Wiley, 2013, ISBN 9781118572115 http://dx.doi.org/10.1002/9781118572115 Digital Forensics for Legal Professionals: Understanding Digital Evidence – From the Warrant to the Courtroom Larry E. Daniel and Lars E. Daniel Elsevier, 2012, ISBN 978-1-59749-643-8 http://www.sciencedirect.com/science/book/9781597496438 10 Digital evolution: history, challenges and future directions for the digital and multimedia sciences section David W. Baker et al. http://dx.doi.org/10.1002/9781118373880.ch10 Forensic Science: Current Issues, Future Directions Douglas H. Ubelaker (Editor) Wiley, 2013, ISBN 9781118373880 http://dx.doi.org/10.1002/9781118373880 Digital forensic research: current state of the art Sriram Raghavan CSI Transactions on ICT, Volume 1, Number 1 (March 2013) http://dx.doi.org/10.1007/s40012-012-0008-7 A framework for unified digital evidence management in security convergence Kyung-Soo Lim and Changhoon Lee Electronic Commerce Research (2013) http://dx.doi.org/10.1007/s10660-013-9119-y Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practices Requirements David Watson Elsevier, 2013, ISBN 978-1-59749-8 http://www.sciencedirect.com/science/book/9781597497428 Advances in Digital Forensics VIII: 8th IFIP WG 11.9 International Conference 2012 Gilbert Peterson and Sujeet Shenoi (Editors) Springer, 2012, ISBN 978-3-642-33962-2 http://dx.doi.org/10.1007/978-3-642-33962-2 Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference 2011 Gilbert Peterson and Sujeet Shenoi (Editors) Springer, 2011, ISBN 978-3-642-24212-0 http://dx.doi.org/10.1007/978-3-642-24212-0 Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference 2010 Kam-Pui Chow and Sujeet Shenoi (Editors) Springer, 2010, ISBN 978-3-642-15506-2 http://dx.doi.org/10.1007/978-3-642-15506-2 Advances in Digital Forensics V: Fifth IFIP WG 11.9 International Conference 2009 Gilbert Peterson and Sujeet Shenoi (Editors) Springer, 2009, ISBN 978-3-642-04155-6 http://dx.doi.org/10.1007/978-3-642-04155-6 Advances in Digital Forensics iV Indrajit Ray and Sujeet Shenoi (Editors) Springer, 2008, ISBN 978-0-387-84927-0 http://dx.doi.org/10.1007/978-0-387-84927-0 Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011 Pavel Gladyshev and Marcus K. Rogers (Editors) Springer, 2012, ISBN 978-3-642-35515-8 http://dx.doi.org/10.1007/978-3-642-35515-8 Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010 Ibrahim Baggili (Editor) Springer, 2011, ISBN 978-3-642-19513-6 http://dx.doi.org/10.1007/978-3-642-19513-6 Digital Forensics and Cyber Crime: First International ICST Conference, ICDF2C 2009 Sanjay Goel (Editor) Springer, 2010, ISBN 978-3-642-11534-9 http://dx.doi.org/10.1007/978-3-642-11534-9 Open Source Software for Digital Forensics Ewa Huebner and Stefano Zanero (Editors) Springer, 2010, ISBN 978-1-4419-5803-7 http://dx.doi.org/10.1007/978-1-4419-5803-7 Linux Malware Incident Response: A Practitioner’s Guide to Forensic Collection and Examination of Volatile Data Cameron H. Malin, Foghan Casey, and James A. Aquilina Elsevier, 2013, ISBN 978-0-12-409507-6 http://www.sciencedirect.com/science/book/9780124095076 Malware Forensic Field Guide for Windows Systems Cameron Malin, Eoghan Casey, and James Aquilina Elsevier, 2012, ISBN 978-1-59749-472-4 http://www.sciencedirect.com/science/book/9781597494724 Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Harlan Carvey Elsevier, 2011, ISBN 978-1-59749-580-6 http://www.sciencedirect.com/science/book/9781597495806 Android Malware Xuxian Jiang and Yajin Zhou Springer, 2013, ISBN 978-1-4614-7394-7 http://dx.doi.org/10.1007/978-1-4614-7394-7 Android Malware and Analysis Ken Dunham, Shane Hartman, Jose Andre Morales, Manu Quintans, and Tim Strazzere CRC Press, 2015, ISBN 978-1-4822-5220-0 http://dx.doi.org/10.1201/b17598 Automatic Malware Analysis: An Emulator Based Approach Heng Yin and Dawn Song Springer, 2013, ISBN 978-1-4614-5523-3 http://dx.doi.org/10.1007/978-1-4614-5523-3 PBX Security and Forensics: A Practical Approach Iosif I. Androulidakis Springer, 2013, ISBN 978-1-4614-1656-2 http://dx.doi.org/10.1007/978-1-4614-1656-2 A critical review of 7 years of Mobile Device Forensics Konstantia Barmpatsalou, Dimitrios Damopoulas, Georgios Kambourakis, and Vasilios Katos Digital Investigation, Volume 10, Number 4 (December 2013) http://dx.doi.org/10.1016/j.diin.2013.10.003 Identifying back doors, attack points, and surveillance mechanisms in iOS devices Jonathan Zdziarski Digital Investigation, Volume 11, Number 1 (March 2014) http://dx.doi.org/10.1016/j.diin.2014.01.001 iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad, and iOS Devices Andrew Hoog and Katie Strzempka Elsevier, 2011, ISBN 978-1-59749-659-9 http://www.sciencedirect.com/science/book/9781597496599 Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management Anton A. Chuvakin, Kevin J. Schmidt, and Christopher Phillips Elsevier, 2013, ISBN 978-1-59749-635-3 http://www.sciencedirect.com/science/book/9781597496353 Virtualization and Forensics: A Digital Forensic Investigator’s Guide to Virtual Environments Diane Barrett and Gregory Kipper Elsevier, 2010, ISBN 978-1-59749-557-8 http://www.sciencedirect.com/science/book/9781597495578 Secrets Stolen, Fortunes Lost Christopher Burgess and Richard Power Elsevier, 2008, ISBN 978-1-59749-255-3 http://www.sciencedirect.com/science/book/9781597492553 Inside the SPAM Cartel: Trade Secrets from the Dark Side Stu Sjouwerman and Jeffrey Posluns Elsevier, 2004, ISBN 978-1-932266-86-3 http://www.sciencedirect.com/science/book/9781932266863 Back to the Table of Contents ======================================= Risk ================================= Managing Risk and Information Security: Protect to Enable Malcolm Harkins Springer, 2013, ISBN 978-1-4302-5114-9 http://dx.doi.org/10.1007/978-1-4302-5114-9 Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis Mark Ryan M. Talabis and Jason L. Martin Elsevier, 2013, ISBN 978-1-59749-735-0 http://www.sciencedirect.com/science/book/9781597497350 IT Security Risk Management: Perceived IT Security Risks in the Context of Cloud Computing Tobias Ackermann Springer, 2013, ISBN 978-3-658-01115-4 http://dx.doi.org/10.1007/978-3-658-01115-4 Measuring and Managing Information Risk: A FAIR Approach Jack Freund and Jack Jones Elsevier, 2015, ISBN 978-0-12-420231-3 http://www.sciencedirect.com/science/book/9780124202313 Risk Management Framework: A Lab-Based Approach to Securing Information Systems James Broad Elsevier, 2013, ISBN 978-1-59749-995-8 http://www.sciencedirect.com/science/book/9781597499958 FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security Stephen D. Gantz and Daniel R. Philpott Elsevier, 2013, ISBN 978-1-59749-641-4 http://www.sciencedirect.com/science/book/9781597496414 FISMA Compliance Handbook Laura P. Taylor Elsevier, 2013, ISBN 978-0-12-405871-2 http://www.sciencedirect.com/science/book/9780124058712 Social Media Security: Leveraging Social Networking While Mitigating Risk Michael Cross Elsevier, 2014, ISBN 978-1-59749-986-6 http://www.sciencedirect.com/science/book/9781597499866 Managing Online Risk: Apps, Mobile, and Social Media Security Deborah Gonzalez Elsevier, 2015, ISBN 978-0-12-20055-5 http://www.sciencedirect.com/science/book/9780124200555 The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk Carl S. Young Elsevier, 2015, ISBN 978-0-12-420056-2 http://www.sciencedirect.com/science/book/9780124200562 Back to the Table of Contents ======================================= Trust ================================= Trust as a facilitator in cloud computing: a survey Sheikh Mahbub Habib, Sascha Hauke, Sebastian Ries, and Max Muhlhauser Journal of Cloud Computing, Volume 1 (December 2012) http://www.journalofcloudcomputing.com/content/1/1/19 Trust mechanisms for cloud computing Jingwei Huang and David M. Nicol Journal of Cloud Computing, Volume 2 (December 2013) http://dx.doi.org/10.1186/2192-113X-2-9 Trust, Distrust and Commitment Katherine Hawley Noûs, Volume 48, Number 1 (March 2014) http://dx.doi.org/10.1111/nous.12000 Trust, Computing, and Society Richard H.R. Harper (Editor) Cambridge University Press, 2014, ISBN 9781139828567 http://dx.doi.org/10.1017/CBO9781139828567 Trust: The Evolutionary Game of Mind and Society Toshio Yamagishi Springer, 2011, ISBN 978-1-431-53936-0 http://dx.doi.org/10.1007/978-4-431-53936-0 Towards a Theory of Trust in Networks of Humans and Computers Virgil Gligor and Jeannette M. Wing CMU-CyLab-110016 (September 8, 2011) CyLab, Carnegie Mellon University http://repository.cmu.edu/cylab/88/ A Survey of Trust in Social Networks Wanita Sherchan, Surya Nepal, and Cecile Paris ACM Computing Surveys, Volume 45, Number 4 (August 2013) http://dx.doi.org/10.1145/2501654.2501661 Chapter 1 Introduction: Embedded Trust http://dx.doi.org/10.1007/0-306-47645-2_1 Social Networks and Trust Vincent Buskens Springer, 2002, ISBN 978-0-306-47645-7 http://dx.doi.org/10.1007/b109038 Back to the Table of Contents ======================================= Professional Certifications ================ CISSP (Certified Information Systems Security Professional) Certification https://www.isc2.org/cissp/default.aspx Wikipedia: http://en.wikipedia.org/wiki/Certified_Information_Systems_S ecurity_Professional CSSLP (Certified Secure Software Lifecycle Professional) Certification https://www.isc2.org/csslp/Default.aspx Certification Programs https://www.isc2.org/credentials/default.aspx International Information Systems Security Certification Consortium https://www.isc2.org/ Wikipedia: http://en.wikipedia.org/wiki/(ISC)%C2%B2 Eleventh Hour CISSP® Study Guide, Second Edition Eric Conrad, Seth Misenar, and Joshua Feldman Elsevier, 2014, ISBN 978-0-12-417142-8 http://www.sciencedirect.com/science/book/9780124171428 CISSP® Practice Exams, Second Edition Shon Harris McGraw-Hill, 2013, ISBN 9780071792349 **** Login to books24X7 digital library **** and search on the ISBN number above ************************************* CISSP® All–in-One Exam Guide, Sixth Edition Shon Harris McGraw-Hill, 2013, ISBN 9780071781749 **** Login to books24X7 digital library **** and search on the ISBN number above ************************************* CSSLP® Certification All–in-One Exam Guide Wm. Arthur Conklin and Dan Shoemaker McGraw-Hill, 2013, ISBN 9780071760263 **** Login to books24X7 digital library **** and search on the ISBN number above ************************************* HCISPPSM – HealthCare Information Security and Privacy Professional https://www.isc2.org/hcispp/default.aspx https://www.isc2.org/innerpage.aspx?id=11284 HCISPP Study Guide Timothy Virtue and Justin Rainey Elsevier, 2015, ISBN 978-0-12-802043-2 http://www.sciencedirect.com/science/book/9780128020432 Back to the Table of Contents ======================================= Careers in Cybersecurity ================= Also see: Items on relevant shelves in the Skills for Success, English, Job Search, and Entrepreneurship section. Introduction to US Cybersecurity Careers Henry Dalziel Elsevier, 2015, ISBN 978-0-12-802722-6 http://www.sciencedirect.com/science/book/978012802 7226 Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game Josh More Elsevier, 2014, ISBN 978-0-12-416601-1 http://www.sciencedirect.com/science/book/978012416 6011 From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line J. David Quilter Elsevier, 2013, ISBN 978-0-12-411594-1 http://www.sciencedirect.com/science/book/9780124115941 Security Careers: Skills, Compensation, and Career Paths; Third Edition Stephen W. Walker and James E. Fushee Elsevier, 2014, ISBN 978-0-12-800104-2 http://www.sciencedirect.com/science/book/9780128001042 Back to the Table of Contents ======================================= Programming ========================== Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE Prabath Siriwardena Springer, 2014, ISBN 978-1-4302-6817-8 http://dx.doi.org/10.1007/978-1-4302-6817-8 Coding for Penetration Testers: Building Better Tools Jason Andress and Ryan Linn Elsevier, 2012, ISBN 978-1-59749-729-9 http://www.sciencedirect.com/science/book/9781597497299 Cryptography in C and C++ Michael Welschenbach Springer, 2005, ISBN 978-1-4302-0026-0 http://dx.doi.org/10.1007/978-1-4302-0026-0 Foundations of Security: What Every Programmer Needs to Know Neil Daswani, Christoph Kern, and Anita Kesavan Springer, 2007, ISBN 978-1-4302-0377-3 http://dx.doi.org/10.1007/978-1-4302-0377-3 Gray Hat Python: Python Programming for Hackers and Reverse Engineers Justin Seitz No Starch Press, 2009, ISBN 9781593271923 **** Login to books24X7 digital library **** and search on the ISBN number above ************************************* Introduction to Reliable and Secure Distributed Programming, Second Edition Christian Cachin, Rachid Guerraoui, and Luis Rodrigues Springer, 2011, ISBN 978-3-642-15260-3 http://dx.doi.org/10.1007/978-3-642-15260-3 Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring Harlan Carvey Elsevier, 2007, ISBN 978-1-59749-173-0 http://www.sciencedirect.com/science/book/9781597491730 Practical Cryptography: Algorithms and Implementations Using C++ Saiful Azad and Al-Sakib Khan Pathan (Editors) CRC Press, 2015, ISBN 978-1-4822-2890-8 http://dx.doi.org/10.1201/b17707 Securing the Tangled Web: Preventing script injection vulnerabilities through software design Christopher Kern Communications of the ACM, Volume 57, Number 9 (September 2014) http://dx.doi.org/10.1145/2643134 Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers TJ. O’Connor Elsevier, 2013, ISBN 978-1-59749-957-6 http://www.sciencedirect.com/science/book/9781597499576 Web Application Obfuscation Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, and David Lindsay Elsevier, 2011, ISN 978-1-59749-604-9 http://www.sciencedirect.com/science/book/9781597496049 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them Michael Howard and David LeBlanc McGraw-Hill, 2010, ISBN 9780071626750 http://www.accessengineeringlibrary.com/browse/24-deadlysins-of-software-security-programming-flaws-and-how-to-fixthem Back to the Table of Contents ======================================= Mathematics for Cryptography ============ Introduction to Public Key Cryptography and Modular Arithmetic Robert Milson (February 2008) http://arxiv.org/abs/cs/9903001 Mathematics of Public Key Cryptography Steven D. Galbraith Cambridge University Press, 2012, ISBN 9781139013926 http://dx.doi.org/10.1017/CBO9781139012843 Concepts and Calculation in Cryptography Dan Grundy PhD Thesis, University of Kent (March 2008) http://www.cs.kent.ac.uk/people/staff/eab2/crypto/thesis.we b.pdf Cryptography and Formal Methods Website, University of Kent http://www.cs.kent.ac.uk/people/staff/eab2/crypto/ Elementary Number Theory: Primes, Congruences, and Secrets William Stein (2011) http://wstein.org/ent/ Elementary Number Theory, Cryptography and Codes Maria Welleda Baldoni, Giro Giliberto, and Giulia Maria Piacentini Cattaneo Springer, 2009, ISBN 978-3-540-69200-3 http://dx.doi.org/10.1007/978-3-540-69200-3 Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan Springer, 2009, ISBN 978-0-387-77268-4 http://dx.doi.org/10.1007/978-0-387-77268-4 Black-Box Models of Computation in Cryptology Tibor Jager Springer, 2012, ISBN 978-3-8348-1990-1 http://dx.doi.org/10.1007/978-3-8348-1990-1 Codes: An Introduction to Information Communication and Cryptography N.L. Biggs Springer, 2008, ISBN 978-1-84800-273-9 http://dx.doi.org/10.1007/978-1-84800-273-9 Codes and Turbo Codes Claude Berrou Springer, 2010, ISBN 978-2-8178-0039-4 http://dx.doi.org/10.1007/978-2-8178-0039-4 A Student’s Guide to Coding and Information Theory Stefan M. Moser and Po-Ning Chen Cambridge University Press, 2012, ISBN 9781139059534 http://dx.doi.org/10.1017/CBO9781139059534 Rubik’s for Cryptographers Christophe Petit and Jean-Jacques Quisquater http://www.ams.org/notices/201306/rnoti-p733.pdf Notices of the AMS, Volume 60, Number 6 (June/July 2013) http://www.ams.org/notices/201306/ A Mathematical Theory of Communication C. E. Shannon The Bell System Technical Journal, Volume 27, Number 3 (July 1948) http://www.alcatel-lucent.com/bstj/vol271948/articles/bstj27-3-379.pdf Communication Theory of Secrecy Systems C. E. Shannon The Bell System Technical Journal, Volume 28, Number 4 (October 1949) http://www.alcatel-lucent.com/bstj/vol281949/articles/bstj28-4-656.pdf Cryptography in Constant Parallel Time Benny Applebaum Springer, 2014, ISBN 978-3-642-17367-7 http://dx.doi.org/10.1007/978-3-642-17367-7 Back to the Table of Contents ======================================= Cryptography ========================== A Cryptography Primer: Secrets and Promises Philip N. Klein Cambridge University Press, 2014, ISBN 9781139084772 http://dx.doi.org/10.1017/CBO9781139084772 Modern Cryptography Primer: Theoretical Foundations and Practical Applications Czeslaw Koscielny, Miroslaw Kurkowski, and Marian Srebrny Springer, 2013, ISBN 978-3-642-41386-5 http://dx.doi.org/10.1007/978-3-642-41386-5 Quantum Cryptography: A Survey Dagmar Bruss, Gabor Erdelyi, Tim Meyer, Tobias Riege, and Jorg Rohe ACM Computing Surveys, Volume 39, Number 2 (July 2007) http://dx.doi.org/10.1145/1242471.1242474 Cryptography and Secure Communication Richard E. Blahut Cambridge University Press, 2014, ISBN 9781139013673 http://dx.doi.org/10.1017/CBO9781139013673 Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications Feng Liu and Wei Qi Yan Springer, 2014, ISBN 978-3-319-09644-5 http://dx.doi.org/10.1007/978-3-319-09644-5 A Course in Mathematical Cryptography Gilbert Baumslag, Benjamin Fine, Martin Kreuzer, and Gerhard Rosenberger Walter de Gruyter, 2015, ISBN 978-3-11-037277-9 http://www.degruyter.com/viewbooktoc/product/431540 The Rabin cryptosystem revisited Michele Elia, Matteo Piva, and Davide Schipani Applicable Algebra in Engineering, Communication and Computing; Volume 26, Number 3 (June 2015) http://dx.doi.org/10.1007/s00200-014-0237-0 Timing Channels in Cryptography: A Micro-Architectural Perspective Chester Rebeiro, Debdeep Mukhopadhyay, and Sarani Bhattacharya Springer, 2015, ISBN 978-3-319-12370-7 http://dx.doi.org/10.1007/978-3-319-12370-7 The Growth of Cryptography Ronald Rivest, Erna Viterbi Professor of Electrical Engineering and Computer Science, Massachusetts Institute of Technology http://www.youtube.com/watch?v=D4HcvehEU9c TURING CENTENNIAL CELEBRATION Princeton University (May 10-12, 2012) http://www.princeton.edu/turing/index.xml Keeping Secrets: Cryptography In A Connected World Panel Discussion, World Science Festival (2014) Panel: Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow https://www.youtube.com/watch?v=nVVF8dgKC38 Public Key Cryptography: Applications and Attacks Lynn Margaret Batten Wiley, 2013, ISBN 9781118482261 http://dx.doi.org/10.1002/9781118482261 Introduction to Cryptography with Maple Jose Luis Gomes Pardo Springer, 2013, ISBN 978-3-642-32166-5 http://dx.doi.org/10.1007/978-3-642-32166-5 Understanding Cryptography: A Textbook for Students and Practitioners Christof Paar and Jan Pelzl Springer, 2010, ISBN 978-3-642-04101-3 http://dx.doi.org/10.1007/978-3-642-04101-3 Protocols for Authentication and Key Establishment Colin Boyd and Anish Mathuria Springer, 2003, ISBN 978-3-662-09527-0 http://dx.doi.org/10.1007/978-3-662-09527-0 A Classical Introduction to Cryptography Serge Vaudeney Springer, 2006, ISBN 978-0-387-25880-5 http://dx.doi.org/10.1007/b136373 A Classical Introduction to Cryptography Exercise Book Thomas Baigneres, Pascal Junod, Yi Lu, Jean Monnerat, and Serge Vaudenay Springer, 2006, ISBN 978-0-387-28835-2 http://dx.doi.org/10.1007/0-387-28835-X Introduction to Cryptography: Principles and Applications Hans Delfs and Helmut Knebl Springer, 2007, ISBN 978-3-540-49244-3 http://dx.doi.org/10.1007/3-540-49244-5 Decrypted Secrets: Methods and Maxims of Cryptology Friedrich Bauer Springer, 2007, ISBN 978-3-540-48121-8 http://dx.doi.org/10.1007/978-3-540-48121-8 An Introduction to Mathematical Cryptography, Second Edition Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman Springer, 2014, ISBN 978-1-4939-1711-2 http://dx.doi.org/10.1007/978-1-4939-1711-2 Foundations of Cryptography: Basic Tools Oded Goldreich Cambridge University Press, 2001, ISBN 9780511546891 http://dx.doi.org/10.1017/CBO9780511546891 Foundations of Cryptography II: Basic Applications Oded Goldreich Cambridge University Press, 2004, ISBN 9780511721656 http://dx.doi.org/10.1017/CBO9780511721656 Algebraic Cryptanalysis Gregory V. Bard Springer, 2009, ISBN 978-0-387-88757-9 http://dx.doi.org/10.1007/978-0-387-88757-9 Adaptive Cryptographic Access Control Anne V.D.M. Kayem, Selim G. Akl, and Patrick Martin Springer, 2010, ISBN 978-1-4419-6655-1 http://dx.doi.org/10.1007/978-1-4419-6655-1 Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis Jean-Baptiste Bedrune, Eric Filiol, and Frederic Raynal Journal in Computer Virology, Volume 6, Number 3 (August 2010) http://dx.doi.org/10.1007/s11416-008-0117-x Brute Force: Cracking the Data Encryption Standard Matt Curtin Springer, 2005, ISBN 978-0-387-27160-6 http://dx.doi.org/10.1007/b138699 Cryptanalytic Attacks on RSA Song Y. Yan Springer, 2010, ISBN 978-0-387-48742-7 http://dx.doi.org/10.1007/978-0-387-48742-7 Quantum Attacks on Public-Key Cryptosystems Song Y. Yan Springer, 2013, ISBN 978-1-4419-7722-9 http://dx.doi.org/10.1007/978-1-4419-7722-9 Stream Ciphers Andreas Klein Springer, 2013, ISBN 978-1-4471-5079-4 http://dx.doi.org/10.1007/978-1-4471-5079-4 The Block Cipher Companion Lars R. Knudsen and Matthew J.B. Robshaw Springer, 2011, ISBN 978-3-642-17342-4 http://dx.doi.org/10.1007/978-3-642-17342-4 Cryptography for Network Security: Failures, Successes and Challenges Bart Preneel http://dx.doi.org/10.1007/978-3-642-14706-7_4 From NLP (Natural Language Processing) to MLP (Machine Language Processing) Peter Teufl, Udo Payer, and Guenter Lackner http://dx.doi.org/10.1007/978-3-642-14706-7_20 Computer Network Security: MMM-ACNS 2010 Igor Kotenko and Victor Skormin (Editors) Springer, 2010, ISBN 98703-642-14706-7, LNCS 6258 http://dx.doi.org/10.1007/978-3-642-14706-7 Fault Analysis in Cryptography Marc Joye and Michael Tunstall (Editors) Springer, 2012, ISBN 978-3-642-29656-7 http://dx.doi.org/10.1007/978-3-642-29656-7 Handbook of Applied Cryptography Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone CRC Press, 1996 (Fifth Printing, August 2001, ISBN 0-8493-8523-7 http://cacr.uwaterloo.ca/hac/ Website of Alfred Menezes http://www.math.uwaterloo.ca/~ajmeneze/ Analysis and Design of Cryptographic Hash Functions PhD Thesis (1993, book in progress) Bart Preneel http://homes.esat.kuleuven.be/~preneel/phd_preneel_feb199 3.pdf Bart Preneel’s Home Page http://homes.esat.kuleuven.be/~preneel/ Merkle-Damgard Revisited: How to Construct a Hash Function Jean-Sebastien Coron, Yevgeniy Dodis, Cecile Malinaud, and Prashant Puniya Advancess in Cryptology – Crypto 2005 Springer, 2005, ISBN 978-3-540-31870-5, LNCS 3621 http://dx.doi.org/10.1007/11535218_26 The Hash Function BLAKE Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, and Luca Henzen Springer, 2014, ISBN 978-3-662-44757-4 http://dx.doi.org/10.1007/978-3-662-44757-4 Symmetric Cryptographic Protocols Mahalingam Ramkumar Springer, 2015, ISBN 978-3-319-07584-6 http://dx.doi.org/10.1007/978-3-319-07584-6 The Computational Lens – Pauli Lectures, ETH Zurich The “P vs. NP” Problem: Efficient Computation, Internet Security, and the Limits to Human Knowledge (May 7, 2012) http://www.youtube.com/watch?v=pTeZP-XfuKI Cryptography: Secrets and Lies, Knowledge and Trust (May 8, 2012) http://www.youtube.com/watch?v=Eu_j5_tains Randomness – the Utility of Unpredictability (May 10, 2012) http://www.youtube.com/watch?v=ZzsFb-6wvoE Professor Avi Wigderson, Institute for Advanced Study Website: http://www.math.ias.edu/avi/ DBLP: http://www.informatik.unitrier.de/~ley/pers/hd/w/Wigderson:Avi.html Back to the Table of Contents ======================================= History of Cryptology ==================== Cryptology: The Mathematics of Secure Communication Gustavus J. Simmons The Mathematical Intelligencer, Volume 1, Number 4 (December 1979) http://dx.doi.org/10.1007/BF03028244 Abraham Lincoln’s Cyphering Book and Ten other Extraordinary Cyphering Books Nerida F. Ellerton and M. A. (Ken) Clements Springer, 2014, ISBN 978-3-319-02502-5 http://dx.doi.org/10.1007/978-3-319-02502-5 Code Breaking in the Pacific Peter Donovan and John Mack Springer, 2014, ISBN 978-3-319-08278-3 http://dx.doi.org/10.1007/978-3-319-08278-3 Back to the Table of Contents ======================================= Alice and Bob in Cipherspace ============= This shelf contains the original article, links to the article’s bibliography, and links to additional items I consider relevant and useful. Alice and Bob in Cypherspace Brian Hayes American Scientist, Volume 100, Number 5 (September-October 2012) http://www.americanscientist.org/issues/pub/2012/5/aliceand-bob-in-cipherspace Evaluating 2-DNF Formulas on Ciphertexts Dan Boneh, Eu-Jin Coh, and Kobbi Nissim http://dx.doi.org/10.1007/978-3-540-30576-7_18 Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 Joe Kilian (Editor) Springer, 2005, ISBN 978-3-540-30576-7, LNCS 3378 http://dx.doi.org/10.1007/b106171 Fully Homomorphic Encryption without Bootstrapping: ITCS 2012 Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan http://eprint.iacr.org/2011/277.pdf Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages: Crypto 2011 Zvika Brakerski and Vinod Vaikuntanathan http://www.stanford.edu/~zvika/localpapers/IdealHom.pdf Homepage of Zvika Brakerski http://www.stanford.edu/~zvika/ Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers Jean-Sebastien Coron, David Naccache, and Mehdi Tibouchi http://dx.doi.org/10.1007/978-3-642-29011-4_27 Fully Homomorphic Encryption with Polylog Overhead Craig Gentry, Shai Halevi, and Nigel P. Smart http://dx.doi.org/10.1007/978-3-642-29011-4_28 Advances in Cryptology – EUROCRYPT 2012 David Pointcheval and Thomas Johansson (Editors) Springer, 2012, ISBN 978-3-642-29011-4, LNCS 7237 http://dx.doi.org/10.1007/978-3-642-29011-4 Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers – Talk at EUROCRYPT 2012 Jean-Sebastien Coron http://www.youtube.com/watch?v=SDIXprI3D7k Fully Homomorphic Encryption with Polylog Overhead – Talk at EUROCRYPT 2012 http://www.youtube.com/watch?v=dIUU24jBFok Talks at EUROCRYPT 2012 http://www.youtube.com/watch?v=X2W8YEppLbI&feature=list _other&playnext=1&list=SPC73BF951C580030A A Fully Homomorphic Scheme Ph.D. Dissertation, Department of Computer Science, Stanford University (September 2009) Craig Gentry http://crypto.stanford.edu/craig/ Fully Homomorphic Encryption Using Ideal Lattices Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC 2009) Craig Gentry http://dx.doi.org/10.1145/1536414.1536440 Implementing Gentry’s Fully-Homomorphic Encryption Scheme Craig Gentry and Shai Halevi http://dx.doi.org/10.1007/978-3-642-20465-4_9 Advances in Cryptology – EUROCRYPT 2011 Kenneth G. Paterson (Editor) Springer, 2011, ISBN 978-3-642-20464-7, LNCS 6632 http://dx.doi.org/10.1007/978-3-642-20465-4 Probabilistic Encryption & How To Play Mental Poker Keeping Secret All Partial Information Proceedings of the 14th Annual ACM Symposium on Theory of Computing (STOC 1982) Shafi Goldwasser and Silvio Micali http://dx.doi.org/10.1145/800070.802212 The Story of Alice and Bob John Gordon http://www.johngordonsweb.co.uk/concept/alicebob.html Concept Laboratories http://www.johngordonsweb.co.uk/concept/index.html Can Homomorphic Encryption be Practical? Proceedings of the 3rd ACM Workshop on Cloud Computing Security (CCSW 2011) Kristin Lauter, Michael Naehrig, and Vinod Vaikuntanathan http://dx.doi.org/10.1145/2046660.2046682 On Data Banks and Privacy Homomorphisms Ronald L. Rivest, Len Adleman, and Michael L. Detouzos http://people.csail.mit.edu/rivest/RivestAdlemanDertouzosOnDataBanksAndPrivacyHomomorphisms.pdf Home Page of L. Rivest http://people.csail.mit.edu/rivest/ Google Scholar http://scholar.google.com/citations?user=6qE0tdAAAAAJ&hl=e n Wikipedia: http://en.wikipedia.org/wiki/Ron_Rivest Fully Homomorphic Encryption over the Integers Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan http://dx.doi.org/10.1007/978-3-642-13190-5_2 Advances in Cryptology – EUROCRYPT 2010 Henri Gilbert (Editor) Springer, 2010, ISBN 978-3-642-13190-5, LNCS 6110 http://dx.doi.org/10.1007/978-3-642-13190-5 Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes Nigel P. Smart and Frederick Vercauteren http://dx.doi.org/10.1007/978-3-642-13013-7_25 Public Key Cryptography – PKC 2010 Phong Q. Nguyen and David Pointcheval (Editors) Springer, 2010, ISBN 978-3-642-13012-0, LNCS 6056 http://dx.doi.org/10.1007/978-3-642-13013-7 Home Page of Nigel Smart (Contains an online version of his book Cryptography, An Introduction: Third Edition) http://www.cs.bris.ac.uk/~nigel/ Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan http://www.cs.toronto.edu/~vinodv/FHE-focs-survey.pdf Homepage of Vinod Vaikuntanathan http://www.cs.toronto.edu/~vinodv/ Homomorphic Encryption Tutorial (Crypto 2011) Shai Halevi, IBM Research http://www.youtube.com/watch?v=jIWOR2bGC7c http://www.youtube.com/watch?v=huLGjBpj3Os Part 1 Part 2 Fully Homomorphic Encryption Shai Halevi, IBM Research http://www.youtube.com/watch?v=R5jaHNC_neI http://www.youtube.com/watch?v=1UDZko9jW5w Part 1 Part 2 Winter School on Secure Computation and Efficiency Professor Yehuda Lindell, Department of Computer Science, Bar-Ilan University http://www.youtube.com/watch?v=z3U-5mf6hGw Encrypted Messages from the Heights of Cryptomania Craig Gentry http://dx.doi.org/10.1007/978-3-642-36594-2_7 Theory of Cryptography, 10th Theory of Cryptography Conference, TCC2013 Amit Sahai (Editor) Springer, 2013, ISBN 978-3-642-36594-2, LNCS 7785 http://dx.doi.org/10.1007/978-3-642-36594-2 Back to the Table of Contents ======================================= How to Share a Secret =================== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ How to Share a Secret (Chapter 17) Johannes Blomer http://dx.doi.org/10.1007/978-3-642-15328-0_17 Algorithms Unplugged B. Vocking et al. (Editors) Springer, 2011, ISBN 978-3-642-15328-0 http://dx.doi.org/10.1007/978-3-642-15328-0 How to Share a Secret Adi Shamir Communications of the ACM, Volume 22, Number 11 (November 1979) http://dx.doi.org/10.1145/359168.359176 Safeguarding cryptographic keys G. R. Blakley Proceedings AFIPS 1979 National Computer Conference http://dx.doi.org/10.1109/AFIPS.1979.98 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The breadth of Shamir’s secret-sharing scheme Ed Dawson and Diane Donovan Computers & Security, Volume 13, Number 1 (February 1994) http://dx.doi.org/10.1016/0167-4048(94)90097-3 An Explication of Secret Sharing Schemes D.R. Stinson Designs, Codes and Cryptography, Volume 2, Number 4 (December 1992) http://dx.doi.org/10.1007/BF00125203 How to Leak a Secret: Theory and Applications of Ring Signatures Ronald L. Rivest, Adi Shamir, and Yael Tauman http://dx.doi.org/10.1007/11685654_7 Theoretical Computer Science: Essays in Memory of Shimon Even Oded Goldreich, Arnold L. Rosenberg, and Alan M. Selman (Editors) Springer, 2006, ISBN 978-3-540-32881-0 http://dx.doi.org/10.1007/11685654 Secret swarm unit: Reactive k-secret sharing Shlomi Dolev, Limor Lahiani, and Moti Yung Ad Hoc Networks, Volume 10, Number 7 (September 2012) http://dx.doi.org/10.1016/j.adhoc.2012.03.011 Back to the Table of Contents ======================================= Anonymization ========================= Anonymization Rolf H. Weber and Ulrike I. Heinrich Springer, 2012, ISBN 978-1-4471-4066-5 http://dx.doi.org/10.1007/978-1-4471-4066-5 Anonymous Communication Networks: Protecting Privacy on the Web Kun Peng CRC Press, 2014, ISBN 978-1-4398-8160-6 http://dx.doi.org/10.1201/b16756 On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems Matthew Edman and Bulent Yener ACM Computing Surveys, Volume 42, Number 1 (December 2009) http://dx.doi.org/10.1145/1592451.1592456 Practical Anonymity: Hiding in Plain Sight Online Peter Loshin Elsevier, 2013, ISBN 978-0-12-410404-4 http://www.sciencedirect.com/science/book/9780124104044 Chapter 13 Privacy for Reporters of Human Rights Abuses: Identity and Anonymity in Mobile Networks Leonardo Martucci and Simone Fischer-Hubner http://dx.doi.org/10.1007/978-94-007-1384-0_13 Chapter 14 Personal Privacy in Mobile Networks Claudio A. Ardagna, Sabrina De Capitani di Vimercati, And Pierangela Samarati http://dx.doi.org/10.1007/978-94-007-1384-0_14 Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation Marta Poblet (Editor) Springer, 2011, ISBN 978-94-007-1384-0 http://dx.doi.org/10.1007/978-94-007-1384-0 Back to the Table of Contents ======================================= Privacy and Identity Management ========= ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ How Companies Learn Your Secrets Charles Duhigg New York Times Magazine (February 16, 2012) http://www.nytimes.com/2012/02/19/magazine/shoppi ng-habits.html?pagewanted=all How Should We Think about Privacy? Jaron Lanier Scientific American, Volume 309, Number 5 (November 2013) http://dx.doi.org/10.1038/scientificamerican1113-64 Home page of Jaron Lanier http://www.jaronlanier.com/ Wikipedia: http://en.wikipedia.org/wiki/Jaron_Lanier The Data-Driven Society Alex “Sandy” Pentland Scientific American, Volume 309, Number 4 (October 2013) http://dx.doi.org/10.1038/scientificamerican1013-78 Browse at Your Own Risk Nick Nikiforakis and Gunes Acar IEEE Spectrum, Volume 51, Number 8 (August 2014) http://dx.doi.org/10.1109/MSPEC.2014.6866435 Privacy vs. Security Sophie Stalla-Bourdillon, Joshua Phillips, and Mark D. Ryan Springer, 2014, ISBN 978-1-4471-6530-9 http://dx.doi.org/10.1007/978-1-4471-6530-9 The End of Privacy (special issue) Science, Volume 347, Number 6221 (30 January 2015) http://www.sciencemag.org/content/347/6221.toc#SpecialIssu e ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Against the Hypothesis of the End of Privacy: An Agent-Based Modelling Approach to Social Media Paola Tubaro, Antonio A. Casilli, and Yasaman Sarabi Springer, 2014, ISBN 978-3-319-02456-1 http://dx.doi.org/10.1007/978-3-319-02456-1 Augmented Reality Law, Privacy, and Ethics: Law, Society, and Emerging AR Technologies Brian D. Wassom Elsevier, 2015, ISBN 978-0-12-800208-7 http://www.sciencedirect.com/science/book/9780128002087 The Anthropologist’s View on Privacy Martin Ortlieb IEEE Security & Privacy, Volume 12, Number 3 (May-June 2014) http://dx.doi.org/10.1109/MSP.2014.57 The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online Denny Cherry Elsevier, 2014, ISBN 978-0-12-800011-3 http://www.sciencedirect.com/science/book/9780128000113 Big Data: A Business and Legal Guide James R. Kalyvas and Michael R. Overly CRC Press, 2015, ISBN 978-1-4665-9238-4 http://dx.doi.org/10.1201/b17406 Can You Engineer Privacy? Seda Gurses Communications of the ACM, Volume 57, Number 8 (August 2014) http://dx.doi.org/10.1145/2633029 Data Brokers: A Call for Transparency and Accountability Federal Trade Commission (May 2014) http://www.ftc.gov/reports/data-brokers-call-transparencyaccountability-report-federal-trade-commission-may-2014 Digital Identity Management Maryline Laurent and Samia Bouzefrane (Editors) Elsevier, 2015, ISBN 978-1-78548-004-1 http://www.sciencedirect.com/science/book/9781785480041 Federated Identity Primer Derrick Rountree Elsevier, 2013, ISBN 978-0-12-4071896 http://www.sciencedirect.com/science/book/9780124071896 Digital Privacy: theory, policies and technologies (special Issue) Travis D. Breaux, Annie I. Anton, Stefanos Gritzalis, and John Mylopoulos (Editors) Requirements Engineering, Volume 16, Number 1 (March 2011) http://link.springer.com/journal/766/16/1/ Electronic Identity Norberto Nuno Gomes de Andrade, Lisha Chen-Wilson, David Argles, Gary Wills, and Michele Schiano di Zenise Springer, 2014, ISBN 978-1-4471-6449-4 http://dx.doi.org/10.1007/978-1-4471-6449-4 Emerging Pervasive Information and Communication Technologies (PICT): Ethical Challenges, Opportunities and Safeguards Kenneth D. Pimple (Editor) Springer, 2014, ISBN 978-94-007-6833-8 http://dx.doi.org/10.1007/978-94-007-6833-8 The End of Privacy TED Radio Hour (September 26, 2014) http://www.npr.org/programs/ted-radiohour/265352348/the-end-of-privacy?showDate=201409-26 Facebook Nation: Total Information Awareness Newton Lee Springer, 2013, ISBN 978-1-4614-5308-6 http://dx.doi.org/10.1007/978-1-4614-5308-6 Privacy and Identity Management for Life Jan Camemisch, Simone Fischer-Hubner, and Kai Rannenberg (Editors) Springer, 2011, ISBN 978-3-642-20317-6 http://dx.doi.org/10.1007/978-3-642-20317-6 Privacy and Identity Management for the Future Internet in the Age of Globalisation Jan Gamenisch, Simone Fischer-Hubner, and Marit Hansen (Editors) Springer, 2015, ISBN 978-3-319-18621-4 http://dx.doi.org/10.1007/978-3-319-18621-4 Privacy and Technologies of Identity: A Cross-Disciplinary Conversation Katherine J. Strandburg and Daniela Stan Raicu Springer, 2006, ISBN 978-0-387-28222-0 http://dx.doi.org/10.1007/0-387-28222-X Privacy, Big Data, and the Public Good: Frameworks for Engagement Julia lane, Victoria Stodden, Stefan Bender, and Helen Neissenbaum (Editors) Cambridge University Press, 2014, ISBN 9781107590205 http://dx.doi.org/10.1017/CBO9781107590205 Privacy in Social Networks Elena Zheleva, Evimaria Terzi, and Lise Getoor Morgan & Claypool, 2012, ISBN 9781608458639 http://dx.doi.org/10.2200/S00408ED1V01Y201203DMK004 Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web Sabine Trepte and Leonard Reinecke (Editors) Springer, 2011, ISBN 978-3-642-21521-6 http://dx.doi.org/10.1007/978-3-642-21521-6 The Privacy Engineer’s Manifesto: Getting from Policy to Code to QA to Value Michelle Finneran Dennedy, Jonathan Fox, and Thomas R. Finneran Springer, 2014, ISBN 978-1-4302-6356-2 http://dx.doi.org/10.1007/978-1-4302-6356-2 Privacy Technologies and Policy – First Annual Privacy Forum, APF 2012 Bart Prenel and Demosthenes Ikonomou (Editors) Springer, 2014, ISBN 978-3-642-54069-1, LNCS 8319 http://dx.doi.org/10.1007/978-3-642-54069-1 Privacy Technologies and Policy – Second Annual Privacy Forum, APF 2014 Bart Prenel and Demosthenes Ikonomou (Editors) Springer, 2014, ISBN 978-3-319-06749-0, LNCS 8450 http://dx.doi.org/10.1007/978-3-319-06749-0 Protecting Privacy in Data Release Giovanni Livraga Springer, 2015, ISBN 978-3-319-16109-9 http://dx.doi.org/10.1007/978-3-319-16109-9 Protection of personal data Factsheet on the “Right to be Forgotten” ruling (C-131-12) European Commission Directorate-General for Justice (2012) http://ec.europa.eu/justice/data-protection/index_en.htm Quo vadis, data privacy? Johannes Gehrke Annals of the New York Academy of Sciences, Volume 1260, Number 1 (July 2012) http://dx.doi.org/10.1111/j.1749-6632.2012.06630.x Reforming European Data Protection Law Serge Gutwirth, Ronald Leenes, and Paul de Hert (Editors) Springer, 2015, ISBN 978-94-017-9385-8 http://dx.doi.org/10.1007/978-94-017-9385-8 RFID – the “Next STEP” in Consumer-Product Relations or Orwellian Nightmare? Challenges for Research and Policy Dag Settemeas Journal of Consumer Policy, Volume 32, Number 3 (September 2009) http://dx.doi.org/10.1007/s10603-009-9103-z Security and Privacy for Augmented Reality Systems Franciska Roesner, Tadayoshi Kohno, and David Molnar Communications of the ACO, Volume 57, Number 4 (April 2014) http://dx.doi.org/10.1145/2580723.2580730 SmartData: Privacy Meets Evolutionary Robotics Inman Harvey, Ann Cavoukian, George Tomko, Don Borett, Hon Kwan, and Dimitrios Hatzinalos (Editors) Springer, 2013, ISBN 978-1-4614-6409-9 http://dx.doi.org/10.1007/978-1-4614-6409-9 Trust and Privacy in Electronic Commerce (special issue) Peter Herrmann and Mozhgan Tavakolifard Electronic Commerce Research, Volume 10, Numbers 3-4 (December 2010) http://link.springer.com/journal/10660/10/3/ Unauthorized Access: The Crisis in Online Privacy and Security Robert H. Sloan and Richard Warner CRC Press, 2014, ISBN 978-1-4398-3014-7 http://dx.doi.org/10.1201/b15148 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ C.A.S.P.I.A.N. Consumers Against Supermarket Privacy Invasion and Numbering http://www.nocards.org/ Deeplinks Blog posts about Biometrics https://www.eff.org/deeplinks/biometrics Deeplinks Topics https://www.eff.org/deeplinks/archives Electronic Frontier Foundation https://www.eff.org/ Privacy https://epic.org/privacy/ Electronic privacy Information Center https://epic.org/ Back to the Table of Contents ======================================= Data Privacy =========================== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Uniquely Me! – How much information does it take to single out one person among billions? Brian Hayes American Scientist, Volume 102, Number 2 (March-April 2014) http://dx.doi.org/10.1511/2014.107.106 Data and privacy (special report): Now you see me, now you don’t. A new model for data sharing. Why modern governance needs statisticians. Brian Tarran, Brian Sweatt, Sam Smith Significance, Volume 11, Number 4 (October 2014) http://dx.doi.org/10.1111/j.1740-9713.2014.00762.x Data privacy Vicenc Torra and Guillermo Navarro-Arribas Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, Volume 4, Number 4 (July/August 2014) http://dx.doi.org/10.1002/widm.1129 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Advanced Research in Data Privacy Guillermo Navarro-Arribas and Vicenc Torra (Editors) Springer, 2015, ISBN 978-3-319-09885-2 http://dx.doi.org/10.1007/978-3-319-09885-2 Cloud Computing and Electronic Discovery James P. Martin and Harry Cendrowski Wiley, 2014, ISBN 9781118764305 http://dx.doi.org/10.1002/9781118915004 Computing with Data Privacy: Steps toward Realization David W. Archer and Kurt Rohloff IEEE Security & Privacy, Volume 13, Number 1 (January-February 2015) http://dx.doi.org/10.1109/MSP.2015.3 Differential Privacy Cynthia Dwork http://dx.doi.org/10.1007/11787006_1 Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006; Proceedings, Part II Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Editors) Springer, 2006, ISBN 978-3-540-35908-1, LNCS 4052 http://dx.doi.org/10.1007/11787006 Cynthia Dwork Wikipedia: http://en.wikipedia.org/wiki/Cynthia_Dwork DBLP: http://www.informatik.unitrier.de/~ley/pers/hd/d/Dwork:Cynthia The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability David Chaum Journal of Cryptology, Volume 1, Number 1 (January 1988) http://dx.doi.org/10.1007/BF00206326 Dining cryptographers problem Wikipedia: http://en.wikipedia.org/wiki/Dining_cryptographers_problem Disclosure Control Methods and Information Loss for Microdata (Chapter 5) Josep Domingo-Ferrer and Vicenc Torra http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.1 046 Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz (Editors) Elsevier, 2001, ISBN 978-0444507617 Elements of Statistical Disclosure Control Leon Willenborg and Ton de Waal Springer, 2001, ISBN 978-1-4613-0121-9 http://dx.doi.org/10.1007/978-1-4613-0121-9 A General Survey of Privacy-Preserving Data Mining: Models and Algorithms (Chapter 2) Charu C. Aggarwal and Philip S. Yu http://dx.doi.org/10.1007/978-0-387-70992-5_2 Privacy-Preserving Data Mining: Models and Algorithms Charu C. Aggarwal and Philip S. Yu (Editors) Springer, 2008, ISBN 978-0-387-70992-5 http://dx.doi.org/10.1007/978-0-387-70992-5 Home Page of Charu C. Aggarwal http://charuaggarwal.net/ Information Fusion in the Context of Data Privacy Guillermo Navarro-Arribas and Vicenc Torra (Editors) Information Fusion, Volume 13, Number 4 (October 2012) http://www.sciencedirect.com/science/article/pii/S156625351 2000024 Privacy Challenges in RFID Gildas Avoine http://dx.doi.org/10.1007/978-3-642-28879-1_1 Data Privacy Management and Autonomous Spontaneus Security: DPM 2011 and SETOP 2011, Revised Selected Papers Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, and Sabrina de Capitani di Vimercati (Editors) Springer, 2012, ISBN 978-3-642-28879-1, LNCS 7122 http://dx.doi.org/10.1007/978-3-642-28879-1 Privacy-Preserving Data Mining Jaideep Vaidya, Chris Clifton, and Michael Zhu Springer, 2006, ISBN 978-0-387-29489-6 http://dx.doi.org/10.1007/978-0-387-29489-6 Statistical Confidentiality: Principles and Practice George T. Duncan, Mark Elliot, Juan-Jose Salazar-Gonzalez Springer, 2011, ISBN 978-1-4419-7802-8 http://dx.doi.org/10.1007/978-1-4419-7802-8 Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David L. Chaum Communications of the ACM, Volume 24, Number 2 (February 1981) http://dx.doi.org/10.1145/358549.358563 David Chaum Wikipedia: http://en.wikipedia.org/wiki/David_Chaum Back to the Table of Contents ======================================= E-Cash ================================ Anonymous Transferable E-Cash Foteini Baldimitsi, Melissa Chase, Georg Fuchsbauer, and Markulf Kohlweiss http://dx.doi.org/10.1007/978-3-662-46447-2_5 Public-Key Cryptography – PKC 2015 Jonathan Katz (Editor) Springer, 2015, ISBN 978-3-662-46447, LNCS 9020 http://dx.doi.org/10.1007/978-3-662-46447-2 Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto (2009) https://bitcoin.org/bitcoin.pdf Bitcoin – a payment network and a new kind of money https://bitcoin.org/ Divisible E-Cash Made Practical Sebastien Canard, David Pointcheval, Olivier Sanders, and Jacques Traore Cryptology ePrint Archive: Report 2014/785 http://eprint.iacr.org/2014/785 http://dx.doi.org/10.1007/978-3-662-46447-2_4 Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data David Lee Kuo Chuen (Editor) Elsevier, 2015, ISBN 978-0-12-802117-0 http://www.sciencedirect.com/science/book/9780128021170 Practical Divisible E-Cash Patrick Martens Cryptology ePrint Archive: Report 2015/18 http://eprint.iacr.org/2015/318 Back to the Table of Contents ======================================= Security Science ======================== Security Science: The Theory and Practice of Security Clifton L Smith and David J Brooks Elsevier, 2013, ISBN 978-0-12-394436-8 http://www.sciencedirect.com/science/book/9780123944368 Security for Business Professionals: How to Plan, Implement, and Manage Your Company’s Security Program Bradley A. Wayland Elsevier, 2014, ISBN 978-0-12-800565-1 http://www.sciencedirect.com/science/book/9780128005651 Corporate Security Management: Challenges, Risks, and Strategies Marko Cabric Elsevier, 2015, ISBN 978-0-12-802934-3 http://www.sciencedirect.com/science/book/9780128029343 Integrated Security System Design: A Complete Reference for Building Enterprise-Wide Digital Security Systems, Second Edition Thomas Norman Elsevier, 2014, ISBN 978-0-12-800022-9 http://www.sciencedirect.com/science/book/9780128000229 Business Espionage: Risk, Threats, and Countermeasures Bruce Wimmer Elsevier, 2015, ISBN 978-0-12-420054-8 http://www.sciencedirect.com/science/book/9780124200548 Global Supply Chain Security: Emerging Topics in Research, Practice and Policy Andrew R. Thomas and Sebastian Vaduva (Editors) Springer, 2015, ISBN 978-1-4939-2178-2 http://dx.doi.org/10.1007/978-1-4939-2178-2 Handbook of Space Security Kai-Uwe Schrogi, Peter L. Hays, Jana Robinson, Denis Moura, and Christina Giannopapa (Editors) Springer, 2015, ISBN 978-1-4614-2029-3 http://dx.doi.org/10.1007/978-1-4614-2029-3 Personal Safety and Security Playbook: Risk Mitigation Guidance for Individuals, Families, Organizations, and Communities Francis J. D’Addario Elsevier, 2014 (2009), ISBN 978-0-12-417226-5 http://www.sciencedirect.com/science/book/9780124172265 Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing Vivek Kumar Sehgal, Anubhav Patrick, Ashutosh Soni, and Lucky Rajput http://dx.doi.org/10.1007/978-3-319-11227-5_22 Classification Mechanism for IoT Devices towards Creating a Security Framework V.J. Jincy and Sudharsan Sundararajan http://dx.doi.org/10.1007/978-3-319-11227-5_23 Intelligent Distributed Systems Rajkumar Buyya and Sabu M. Thampi (Editors) Springer, 2015, ISBN 978-3-319-11227-5 http://dx.doi.org/10.1007/978-3-319-11227-5 Electronic Access Control Thomas Norman Elsevier, 2012, ISBN 978-0-12-382028-0 http://www.sciencedirect.com/science/book/9780123820280 Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations Robert J. Girod CRC Press, 2015, ISBN 978-1-4822-4314-7 http://dx.doi.org/10.1201/b17482 Applied Crime Analysis: A Social Science Approach to Understanding Crime, Criminals, and Victims Wayne Petherick Elsevier, 2015, ISBN 978-0-323-29460-7 http://www.sciencedirect.com/science/book/9780323294607 Evolutionary Criminology: Towards a Comprehensive Explanation of Crime Russil Durant and Tony Ward Elsevier, 2015, ISBN 978-0-12-397937-7 http://www.sciencedirect.com/science/book/9780123979377 Misleading DNA Evidence: Reasons for Miscarriages of Justice Peter Gill Elsevier, 2014, ISBN 978-0-12-417214-2 http://www.sciencedirect.com/science/book/9780124172142 Security Careers: Skills, Compensation, and Career Paths; Third Edition Stephen W. Walker and James E. Fushee Elsevier, 2014, ISBN 978-0-12-800104-2 http://www.sciencedirect.com/science/book/9780128001042 Risk Analysis and the Security Survey, Fourth Edition James F. Broder and Eugene Tucker Elsevier, 2012, ISBN 978-0-12-382233-8 http://www.sciencedirect.com/science/book/9780123822338 The Manager’s Handbook for Business Security, Second Edition George K. Campbell (Contributing Editor) Elsevier, 2014, ISBN 978-0-12-800062-5 http://www.sciencedirect.com/science/book/9780128000625 School Security: How to Build and Strengthen a School Safety Program Paul Timm Elsevier, 2015, ISBN 978-0-12-407811-6 http://www.sciencedirect.com/science/book/9780124078116 The Handbook for School Safety and Security: Best Practices and Procedures Lawrence J. Fennelly and Mariana A. Perry (Editors) Elsevier, 2014, ISBN 978-0-12-800568-2 http://www.sciencedirect.com/science/book/9780128005682 Effective Security Management, Fifth Edition Charles A. Sennewald Elsevier, 2011, ISBN 978-0-12-382012-9 http://www.sciencedirect.com/science/book/9780123820129 Security Consulting, Fourth Edition Charles A. Sennewald Elsevier, 2013, ISBN 978-0-12-398500-2 http://www.sciencedirect.com/science/book/9780123985002 From the Files of a Security Expert Witness Charles A. Sennewald Elsevier, 2014, ISBN 978-0-12-411625-2 http://www.sciencedirect.com/science/book/9780124116252 Effective Physical Security, Fourth Edition Lawrence J. Fennelly Elsevier, 2013, ISBN 978-0-12-415892-4 http://www.sciencedirect.com/science/book/9780124158924 CCTV: From Lights to Pixels, Third Edition Vlado Damjanovski Elsevier, 2014, ISBN 978-0-12-404557-6 http://www.sciencedirect.com/science/book/9780124045576 Digital Video Surveillance and Security, Second Edition Anthony C. Caputo Elsevier, 2014, ISBN 978-0-12-420042-5 http://www.sciencedirect.com/science/book/9780124200425 Security and Loss Prevention, Sixth Edition Philip P. Purpura Elsevier, 2013, ISBN 978-0-12-387846-5 http://www.sciencedirect.com/science/book/9780123878465 Profiling and Serial Crime: Theoretical and Practical Issues, Third Edition Wayne Petherick Elsevier, 2013, ISBN 978-1-4557-3174-9 http://www.sciencedirect.com/science/book/9781455731749 Forensic Victimology: Examining Violent Crime Victims in Investigative and Legal Contexts, Second Edition Brent E. Turvey Elsevier, 2014, ISBN 978-0-12-408084-3 http://www.sciencedirect.com/science/book/9780124080843 Miscarriages of Justice: Actual Innocence, Forensic Evidence, and the Law Brent E. Turvey and Craig M. Cooley Elsevier, 2014, ISBN 978-0-12-411558-3 http://www.sciencedirect.com/science/book/9780124115583 Back to the Table of Contents ======================================= Additional Web Resources =============== Wikipedia: Computer security http://en.wikipedia.org/wiki/Computer_security Cybersecurity Wiki: http://cyber.law.harvard.edu/cybersecurity/Main_Page The White House Blog Michael Daniel http://www.whitehouse.gov/blog/author/Michael%20Da niel National Cybersecurity Institute at Excelsior College http://www.nationalcybersecurityinstitute.org/ Blog of Gene Spafford https://www.cerias.purdue.edu/site/blog/author/spaf/ Krebs on Security – in-depth security news and investigation http://krebsonsecurity.com/ Schneier on Security – a blog covering security and security technology http://www.schneier.com/ Questions & Answers – Cryptography @ Stack Exchange http://crypto.stackexchange.com/ Cryptology ePrint Archive http://eprint.iacr.org/ NaCl: Networking and Cryptography library http://nacl.cr.yp.to/ The Register – Independent news, views, opinions and reviews on the latest in the IT industry http://www.theregister.co.uk/ Ritter’s Crypto Glossary and Dictionary of Technical Cryptography http://www.ciphersbyritter.com/GLOSSARY.HTM Ciphers By Ritter http://www.ciphersbyritter.com/ RSA Laboratories http://www.rsa.com/rsalabs/ Research Showcase @ CMU Carnegie Mellon University http://repository.cmu.edu/ Electronic Frontier Foundation https://www.eff.org/ USENIX Conferences https://www.usenix.org/conferences Back to the Table of Contents ======================================= Legal Matters ========================== Forensic Testimony: Science, Law and Expert Evidence C. Michael Bowers Elsevier, 2014, ISBN 978-0-12-397005-3 http://www.sciencedirect.com/science/book/9780123970053 Harboring Data: Information Security, Law, and the Corporation Andrea M. Matwyshyn (Editor) Stanford University Press, 2009, ISBN 9780804760089 http://dx.doi.org/10.11126/stanford/9780804760089.001.0001 Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace Scott Shackelford Cambridge University Press, 2014, ISBN 9781139021838 http://dx.doi.org/10.1017/CBO9781139021838 Back to the Table of Contents ======================================= Reference Material ===================== Computer and Information Security Handbook, Second Edition John R. Vacca Elsevier, 2013, ISBN 978-0-12-394397-2 http://www.sciencedirect.com/science/book/978012394 3972 Cryptography and Security, Encyclopedia of Henk C.A. van Tilborg and Sushil Jajodia (Editors) Springer, 2011, ISBN 978-1-4419-5906-5 http://dx.doi.org/10.1007/978-1-4419-5906-5 Back to the Table of Contents ======================================= Online Publications – Directly ============= Back to the Table of Contents ======================================= Odds & Ends =========================== Intruders with Caps Siva Anantharaman, Paliath Narendran, and Michael Rusinowitch Term Rewriting and Applications, RTA 2007 Franz Baader (Editor) Springer, 2007, ISBN 978-3-540-73449-9, LNCS 4533 http://dx.doi.org/10.1007/978-3-540-73449-9_4 An Introduction to Digital Signature Schemes Mehran Alidoost Nia, Ali Sajedi, and Aryo Jamshidpey (April 2014) http://arxiv.org/abs/1404.2820 Terrorism, System Thinking and Critical Discourse Analysis Valentina Bartolucci Giorgio Gallo Systems Research and Behavioral Science, Volume 32, Number 1 (February 2015) http://dx.doi.org/10.1002/sres.2206 Back to the Table of Contents =======================================
© Copyright 2025