信息安全
-
密码法进展 INDOCRYPT2006Rana Barua 著This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.
-
计算机安全、可靠性与保密Janusz Górski 著This book constitutes the refereed proceedings of the 25th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2006, held in Gdansk, Poland, in September 2006.The 32 revised full papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on systems of systems, security and survivability analysis, nuclear safety and application of standards, formal approaches, networks dependability, coping with change and mobility, safety analysis and assessment, 6th FP integrated project DECOS, and modelling.
-
隐私增强技术George Danezis 著This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May/June 2005.The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application context.
-
信息安全及密码术Helger Lipmaa 著This book constitutes the refereed proceedings of the Second SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2006 (formerly CISC), held in Beijing, China in November/December 2006.The 23 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in topical sections on digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.
-
击退黑客Robert Schifreen 著The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on computers and the Internet as well as the rapid spread of broadband into more households has resulted in a feeding ground for hackers around the world. Estimated damage costs are now making their way into the billions. The need for some good advice is long overdue. Robert Schifreen, a self-confessed ex-hacker, made history in 1985 when he became the first person in the world to face a jury trial in connection with computer hacking. His subsequent acquittal in the High Court led to a change in UK Law and the introduction of the Computer Misuse Act 1990. His 20 years experience in IT security now lends itself to global radio and TV broadcasts, as well as appearances at conferences and lectures around the world. Keeping your company’s computers free from hackers, viruses, spammers, phishing attacks, social engineers and all the other things that can result in loss of data is a difficult job. Defeating the Hacker is a book about how to protect your computer systems becoming another victim of the hacker. It’s an instant primer into all the things that can go wrong, with advice on how to stop it happening or, if it’s too late, how to fix the damage. Presents unique, UK based, insider information on hacking and security from someone who has operated on both sides of the divide:Develops a populist seam within a hot IT area: security;Shows readers how and why hacking is made possible, whilst suggesting ways to avoid being a victim of it;Written in a dynamic, conversational, yet knowledgeable, style;Filled with information and anecdotal evidence aimed at IT professionals and those with a more general interest;Defeating the Hacker allows the reader to learn how to protect their computer systems with advice from someone who knows how to break into them.作者简介:Robert Schifreen writes and speaks on IT security at seminars and conferences around the world, and has appeared on radio and TV as an expert spokesman around 100 times in the past 6 years.
-
密码术的选择区Douglas R. Stinson 著This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.
-
信息系统安全Aditya Bagchi 著This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006.The 20 revised full papers and 5 short papers presented together with 4 invited papers and 3 ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security and are organized in topical sections on data and application security, access control, key management and security in wireless networks, threat analysis, detection and recovery, cryptography and encryption, as well as short papers and research reports.
-
信息及通信安全Peng Ning 等著This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA in December 2006.The 22 revised full papers and 17 revised short papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on security protocols, applied cryptography, access control and systems security, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, as well as security implementations.
-
快速软件加密法Matt Robshaw 著This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006.The 27 revised full papers presented were carefully reviewed and selected from more than 100 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.
-
密码学进展—CT-RSA 2001David Naccache 著This book constitutes the refereed proceedings of the Cryptographers' Track at RSA Conference 2001, CT-RSA 2001, in San Francisco, CA, USA in April 2001.The 33 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on new cryptosystems; RSA; symmetric cryptography; gambling and lotteries; reductions, constructions, and security proofs; flaws and attacks; implementation; multivariate cryptography; number theoretic problems; passwords and credentials; and protocols.