信息安全
-
信息与计算安全新趋向/会议录Günter Müller 著This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006.The 36 revised full papers presented were carefully reviewed and selected from around 180 submissions. The papers are organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security. -
CISSP傻瓜书 CISSP For DummiesLawrence H. Miller 著The fun and easy way(r) to pass the CISSP exam and get certifiedCramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You&'ll find complete coverage of all ten domains of the (ISC)² Common Body of knowledge to help you pass with flying colors. -
SKYPE HACKS 100个业界最尖端的技巧和工具(美)舍帕德 著,李静 译本书讲述如何让Skype(一个正在像风暴一样席卷全球的Internet电话应用程序)为你工作。拥有超过5000万注册用户以及任何时候在线人数都超过300万,Skype是继Web以来最大的Internet现象之一。越来越多的用户切断他们连接到原来电话公司的线路,代之以通过全部或局部更换到使用Skype而节省了一大笔钱。但是,本书不仅仅是省钱那么简单。Skype给世界带来了一个全新的东西能够做旧式电话系统不能做的事情。呼叫伴随你的左右,不论家庭电话号码还是移动电话号码,只要登录到Skype,呼叫就会找到你。甚至还可以把到电话的链接放到网页上。本书说明了如何:l最大化结余l建立一个Skype服务器l把Skype整合到网页中l把Skype的快捷方式放大桌面上l编写脚本来自动化Skypel管理安全设置l避免Skype上的推销员l使用聊天、文件传输、会议和视频l解决性能跟质量的问题l找到911和411服务的替代品l用Skype替代家庭电话系统l在Windows、Linux、Mac OS X以及Pocket PC上使用Skype不管你是Skype新手还是想研究Skype内部的高手,本书都非常适合你。 -
信息安全与密码术Min Surp Rhee,Byoungcheon Lee 著This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006.The 26 revised full papers presented together with two invited talks have gone through two rounds of reviewing and improvement and were selected from 129 submissions. The papers are organized in topical sections on hash functions, block and stream ciphers, efficient implementation and hardware, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures. -
密码术与网络安全David Pointcheval,Yi Mu,Kefei Chen 著This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability. -
2006 CENEX-SDC 项目国际会议/会议录Josep Domingo-Ferrer 著This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2006, held in December 2006 in Rome, Italy as the main conference of the CENEX-SDC (CENtre of EXcellence for Statistical Disclosure Control) project.The 31 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on methods for tabular protection, utility and risk in tabular protection, methods for microdata protection, utility and risk in microdata protection, protocols for private computation, case studies, and software. -
通信与多媒体安全 CMS 2006/会议录LNCS-4237Herbert Leitold 著The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and Societies, LNCS has grown into the most comprehensive computer science research forum available.The scope of LNCS, including its sub series LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes- Proceedings(published in time for the respective conference) - Post-proceedings(consisting of thoroughly revised final full papers) -research monographs(which may be based on outstanding PhD work, research projects, technical reports, etc.) -
信息安全/会议录Sokratis K. Katsikas 著This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006.The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on software security, privacy and anonymity, block ciphers and hash functions, digital signatures, stream ciphers, encryption, pervasive computing, network security, watermarking and digital rights management, intrusion detection and worms, key exchange, security protocols and formal methods, and information systems security. -
数据隐藏与多媒体安全论文集 IYun Q. Shi 著Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field in multimedia security. Two related disciplines, steganalysis and data forensics, are also increasingly attracting researchers and forming another new research field in multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper deals with evaluation criteria for the performance of audio watermarking algorithms. The second provides a survey of problems related to watermark security. The third discusses practical implementations of zero-knowledge watermark detectors and proposes efficient solutions for correlation-based detectors. The fourth introduces the concept of Personal Entertainment Domains (PED) in Digital Rights Management (DRM) schemes. The fifth reports on the use of fusion techniques to improve the detection accuracy of steganalysis. -
数字水印Digital watermarkingYun Qing Shi 著This book constitutes the refereed proceedings of the 5th International Workshop on Digital Watermarking Secure Data Management, IWDW 2006, held in Jeju Island, Korea in November 2006.The 34 revised full papers presented together with 3 invited lectures were carefully reviewed and selected from 76 submissions. The papers cover both theoretical and practical issues in digital watermarking and they feature such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications.
