信息安全
-
数字业务中的信任与保密Simone Fischer-Hübner 著This book constitutes the refereed proceedings of the Third International Conference on Trust and Privacy in Digital Business, TrustBus 2006, held in Krakow, Poland in September 2006 in conjunction with DEXA 2006.The 24 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments. -
安全数据管理Willem Jonker,Milan Petkovic 著This book constitutes the refereed proceedings of the Third VLDB 2006 International Workshop on Secure Data Management, SDM 2006, held in Seoul, Korea in September 2006 in conjunction with VLDB 2006.The 13 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers are organized in topical sections on privacy protection, privacy preserving data management, access control, and database security. -
信息安全基础徐茂智《信息安全基础》介绍信息安全事先防护理论和技术的基础知识,不追求大而全,而把目标确定为使学生学到结构化的知识和对信息安全有一个系统的了解。《信息安全基础》由基本概念、基本算法、基础密码协议、安全模型、应用技术和基础设施共六章组成。前四章为《普通高等学校信息与计算科学专业系列丛书:信息安全基础》的重点,内容包括基本概念、基本算法与模型的详细讨论。第五章对繁杂的实用技术进行了介绍,主要包括Web安全、数据库安全、电子交易安全三个重要的应用技术的介绍,而对操作系统安全、数据库安全、病毒防护、防火墙、VPN及入侵检测等系统安全方面的知识仅做了概念性的介绍。第六章围绕密钥安全和授权体系对PKI、SKI、PMI的基本知识进行讲述。《信息安全基础》适用于数学、计算机、通信、电子和信息专业的本科高年级学生和研究生一学期课程使用。 -
SKYPE HACKS 100个业界最尖端的技巧和工具(美)舍帕德 著,李静 译本书讲述如何让Skype(一个正在像风暴一样席卷全球的Internet电话应用程序)为你工作。拥有超过5000万注册用户以及任何时候在线人数都超过300万,Skype是继Web以来最大的Internet现象之一。越来越多的用户切断他们连接到原来电话公司的线路,代之以通过全部或局部更换到使用Skype而节省了一大笔钱。但是,本书不仅仅是省钱那么简单。Skype给世界带来了一个全新的东西能够做旧式电话系统不能做的事情。呼叫伴随你的左右,不论家庭电话号码还是移动电话号码,只要登录到Skype,呼叫就会找到你。甚至还可以把到电话的链接放到网页上。本书说明了如何:l最大化结余l建立一个Skype服务器l把Skype整合到网页中l把Skype的快捷方式放大桌面上l编写脚本来自动化Skypel管理安全设置l避免Skype上的推销员l使用聊天、文件传输、会议和视频l解决性能跟质量的问题l找到911和411服务的替代品l用Skype替代家庭电话系统l在Windows、Linux、Mac OS X以及Pocket PC上使用Skype不管你是Skype新手还是想研究Skype内部的高手,本书都非常适合你。 -
密码术故障诊断与容错Luca Breveglieri 著This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006.The 12 revised papers of FDTC 2006 are presented together with 9 papers from FDTC 2004 and FDTC 2005 that passed a second round of reviewing. They all provide a comprehensive introduction to the issues faced by designers of robust cryptographic devices and to the currently available methodologies and techniques for protecting these devices against fault injection attacks. The papers are organized in topical sections on attacks on public key systems, protection of public key systems, attacks on and protection of symmetric key systems, models for fault attacks on cryptographic devices, fault-resistant arithmetic for cryptography, as well as fault attacks and other security threats. -
信息安全/会议录Sokratis K. Katsikas 著This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006.The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on software security, privacy and anonymity, block ciphers and hash functions, digital signatures, stream ciphers, encryption, pervasive computing, network security, watermarking and digital rights management, intrusion detection and worms, key exchange, security protocols and formal methods, and information systems security. -
网络用安全与密码术Roberto De Prisco 著This book constitutes the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006, held in Maiori, Italy in September 2006.The 24 revised full papers presented together with the abstract of an invited talk were carefully revised and selected from 81 submissions. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and public key related cryptanalisis. -
信息与计算机安全进展Hiroshi Yoshiura,Kouichi Sakurai,Kai Rannenberg,Yuko Murayama 著This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006.The 30 revised full papers presented were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on signatures, security evaluation, authentication, encryption and key exchange, network security, security for multimedia, cryptanalysis and implementation, as well as access control. -
应用密码学与网络安全 ACNS 2006/会议录 LNCS-3989Jianying Zhou 著This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006.The 33 revised full papers presented were carefully reviewed and selected from 218 submissions. The papers are organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy. -
密码术与网络安全David Pointcheval,Yi Mu,Kefei Chen 著This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability.
