信息安全
-
Windows Vista安全Roger A. Grimes 著·Written by two veteran Windows security experts, one a Microsoft Security MVP and Foundstone Security Consultant, and one a former senior member of Microsoft's Security Engineering Team. Collectively, Grimes and Johansson have 40 years of security experience, 30 on Windows·This essential resource prepares end users and technical administrators to handle various security problems that still exist in Windows Vista and future threats ·Special in-depth coverage of all significant new security technologies in Windows Vista, including User Account Control, the new Firewall, Internet Explorer 7.0, Windows Defender, Service Hardening, and BitLocker·Covers all significant changes to security in Windows Vista, including new group policy features and settings, how access control has changed, Internet Information Server 7, and more·Valuable tools, documents, *s, and other material will be available for download on the companion web site
-
密码术故障诊断与容错Luca Breveglieri 著This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006.The 12 revised papers of FDTC 2006 are presented together with 9 papers from FDTC 2004 and FDTC 2005 that passed a second round of reviewing. They all provide a comprehensive introduction to the issues faced by designers of robust cryptographic devices and to the currently available methodologies and techniques for protecting these devices against fault injection attacks. The papers are organized in topical sections on attacks on public key systems, protection of public key systems, attacks on and protection of symmetric key systems, models for fault attacks on cryptographic devices, fault-resistant arithmetic for cryptography, as well as fault attacks and other security threats.
-
信息安全/会议录Sokratis K. Katsikas 著This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006.The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on software security, privacy and anonymity, block ciphers and hash functions, digital signatures, stream ciphers, encryption, pervasive computing, network security, watermarking and digital rights management, intrusion detection and worms, key exchange, security protocols and formal methods, and information systems security.
-
网络用安全与密码术Roberto De Prisco 著This book constitutes the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006, held in Maiori, Italy in September 2006.The 24 revised full papers presented together with the abstract of an invited talk were carefully revised and selected from 81 submissions. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and public key related cryptanalisis.
-
信息与计算机安全进展Hiroshi Yoshiura,Kouichi Sakurai,Kai Rannenberg,Yuko Murayama 著This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006.The 30 revised full papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on signatures, security evaluation, authentication, encryption and key exchange, network security, security for multimedia, cryptanalysis and implementation, as well as access control.
-
应用密码学与网络安全 ACNS 2006/会议录 LNCS-3989Jianying Zhou 著This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006.The 33 revised full papers presented were carefully reviewed and selected from 218 submissions. The papers are organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.
-
密码术与网络安全David Pointcheval,Yi Mu,Kefei Chen 著This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.
-
信息安全和密码学Dongho Won 著Book De*ionThis book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in Seoul, Korea, in December 2000.The 20 revised full papers presented were carefully reviewed and selected from a total of 56 submissions. Among the topics addressed are cryptanalysis, elliptic curve cryptography, cryptographic protocols, block ciphers, hash functions, multi-party protocols, digital signatures, E-commerce, anonymous auction systems, finite field polynomials, anonymous fingerprinting, network security, and security evaluation systems.
-
密码学进展Xuejia Lai 著This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2005, held in Shanghai, China in December 2006.The 30 revised full papers presented were carefully reviewed and selected from 314 submissions. The papers are organized in topical sections on attacks on hash functions, stream ciphers and boolean functions, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.
-
信息基础结构安全评定Javier Lopez 著This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Critical Information Infrastructures Security, CRITIS 2006, held on Samos Island, Greece in August/September 2006 in conjunction with ISC 2006, the 9th International Information Security Conference.The 22 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures. Thus dependence on this infrastructure and importance of its security is shown, emerging as a major objective for governments, companies and the research community.