信息安全
-
保护隐私技术设计Hannes Federrath 著Anonymity and unobservability have become key issues in the context of securing privacy on the Internet and in other communication networks. Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications as well as for services where users want to remain anonymous.This book is devoted to the design and realization of anonymity services for the Internet and other communcation networks. The book offers topical sections on: attacks on systems, anonymous publishing, mix systems, identity management, pseudonyms and remailers. Besides nine technical papers, an introduction clarifying the terminology for this emerging area is presented as well as a survey article introducing the topic to a broader audience interested in security issues.
-
数据与应用安全 XIXSushil Jajodia 著This book constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, CT, USA, in August 2005. The 24 revised full papers presented together with an invited lecture were thoroughly reviewed and selected from 54 submissions. The papers present theory, technique, applications, and practical experience of data and application security with topics like cryptography, privacy, security planning and administration, secure information integration, secure semantic Web technologies and applications, access control, integrity maintenance, knowledge discovery and privacy, concurrency control, fault-tolerance and recovery methods.
-
2006 CENEX-SDC 项目国际会议/会议录Josep Domingo-Ferrer 著This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2006, held in December 2006 in Rome, Italy as the main conference of the CENEX-SDC (CENtre of EXcellence for Statistical Disclosure Control) project.The 31 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on methods for tabular protection, utility and risk in tabular protection, methods for microdata protection, utility and risk in microdata protection, protocols for private computation, case studies, and software.
-
通信与多媒体安全 CMS 2006/会议录LNCS-4237Herbert Leitold 著The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and Societies, LNCS has grown into the most comprehensive computer science research forum available.The scope of LNCS, including its sub series LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes- Proceedings(published in time for the respective conference) - Post-proceedings(consisting of thoroughly revised final full papers) -research monographs(which may be based on outstanding PhD work, research projects, technical reports, etc.)
-
快速软件加密Mitsuru Matsui 著This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Fast Software Encryption, FSE 2001, held in Yokohama, Japan in April 2001.The 27 revised full papers presented together with one invited paper were carefully reviewed and selected from 46 submissions. The papers are organized in topical sections on cryptanalysis of block ciphers, hash functions and Boolean functions, modes of operation, cryptanalysis of stream ciphers, pseudo-randomness, and design and evaluation.
-
信息安全Information securityGeorge I Davida,Yair Frankel 著This book constitutes the refereed proceedings of the 6th International Conference on Information and Communications Security, ICICS 2001, held in Malaga, Spain in October 2004.The 42 revised full papers presented were carefully reviewed and selected from 245 submissions. The papers address a broad range of topics in information and communication security including digital signatures, group signature schemes, e-commerce, digital payment systems, cryptographic attacks, mobile networking, authentication, channel analysis, power-analysis attacks, mobile agent security, broadcast encryption, AES, security analysis, XTR, access control, and intrusion detection.
-
数据隐藏与多媒体安全论文集 IYun Q. Shi 著Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis.
-
快速软件加密Bruce Schneier 著This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Fast Software Encryption, FSE 2000, held in New York City, USA in April 2000.The 21 revised full papers presented were carefully reviewed and selected from a total of 53 submissions. The volume presents topical sections on stream-cipher cryptanalysis, new ciphers, AES cryptanalysis, block-cipher cryptanalysis, and theoretical work.
-
Ubuntu 黑客Neal Krawetz 著Ubuntu, an African word meaning “humanity to others,” is the hottest thing in Linux today. This down-and-dirty book shows you how they can blow away the default system settings and get Ubuntu to behave however you want. You’ll learn how to optimize its appearance, speed, usability, and security and get the low-down on hundreds of hacks such as running Ubuntu from a USB drive, installing it on a Mac, enabling multiple CPUs, and putting *s in menus and panels.
-
数字水印Digital watermarkingYun Qing Shi 著This book constitutes the refereed proceedings of the 5th International Workshop on Digital Watermarking Secure Data Management, IWDW 2006, held in Jeju Island, Korea in November 2006.The 34 revised full papers presented together with 3 invited lectures were carefully reviewed and selected from 76 submissions. The papers cover both theoretical and practical issues in digital watermarking and they feature such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications.