Publisher of Humanities, Social Science & STEM Books

View All Book Series


Security, Privacy, and Trust in Mobile Communications

About the Series

Similar to computers, mobile landscape is also facing various security and privacy related threats. Increasing demand of sophisticated handheld mobile devices including smartphones, tablets, and so forth, is making them an attractive target of security threats. Since these devices store confidential data of the end users, and exploitation of vulnerabilities of the underlying technologies can create a havoc on massive scale, it becomes inevitable to need to understand and address the threats associated with them and to analyze the level of trust that can be established for mobile communication scenarios.

This series will present emerging aspects of the mobile communication landscape, and focuses on the security, privacy, and trust issues in mobile communication based applications. It brings state-of-the-art subject matter for dealing with the issues associated with mobile and wireless networks. This series is targeted for researchers, students, academicians, and business professions in the field.

If you're interested in submitting a proposal for a book to be included in the series, please email [email protected]

4 Series Titles

Per Page

Nanoelectronic Devices for Hardware and Software Security

Nanoelectronic Devices for Hardware and Software Security

1st Edition


By Balwinder Raj, Arun Kumar Singh
November 02, 2021

This book has comprehensive coverage of the principles, basic concepts, structure, modelling, practices, and circuit applications of nanoelectronics in hardware/software security. It will also cover the future research directions in this domain. In this evolving era nanotechnology is converting ...

Cross-Site Scripting Attacks Classification, Attack, and Countermeasures

Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures

1st Edition

By B. B. Gupta, Pooja Chaudhary
March 05, 2020

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, ...

Smart Card Security Applications, Attacks, and Countermeasures

Smart Card Security: Applications, Attacks, and Countermeasures

1st Edition

By Brij B. Gupta, Megha Quamara
August 27, 2019

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks ...

Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Edited By Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of ...

AJAX loader