信息安全
-
数字水印Digital watermarkingYun Qing Shi 著This book constitutes the refereed proceedings of the 5th International Workshop on Digital Watermarking Secure Data Management, IWDW 2006, held in Jeju Island, Korea in November 2006.The 34 revised full papers presented together with 3 invited lectures were carefully reviewed and selected from 76 submissions. The papers cover both theoretical and practical issues in digital watermarking and they feature such topics as steganography and steganalysis, data forensics, digital right management, secure watermarking, and their applications.
-
隐私增强技术George Danezis 著This book constitutes the thoroughly refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cambridge, UK, in June 2006 co-located with WEIS 2006, the Workshop on the Economics of Information Security, and WOTE 2006, the IAVoSS Workshop On Trustworthy Elections.The 24 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing and improvement. The papers both from academia and industry present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.
-
IT安全与隐私Simone Fischer-Hübner 著Invasion of privacy and misuse of personal data are among the most obvious negative effects of today's information and communication technologies. Besides technical issues from a variety of fields, privacy legislation, depending on national activities and often lacking behind technical progress, plays an important role in designing, implementing, and using privacy-enhancing systems.Taking into account technical aspects from IT security, this book presents in detail a formal task-based privacy model which can be used to technically enforce legal privacy requirements. Furthermore, the author specifies how the privacy model policy has been implemented together with other security policies in accordance with the Generalized Framework for Access Control (GFAC).This book will appeal equally to R&D professionals and practitioners active in IT security and privacy, advanced students, and IT managers.
-
计算机安全Eugene Asarin,Dieter Gollmann,Jan Meier 等著This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006, held in Hamburg, Germany, in September 2006.The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.
-
分布系统的稳定性、安全与保密 SSS 2006 /会议录LNCS-4280Ajoy K. Datta 著This book constitutes the refereed proceedings of the 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems (formerly Symposium on Self-Stabilizing Systems), SSS 2006, held in Dallas, TX, USA in November 2006.The 36 revised full papers and 12 revised short papers presented together with the extended abstracts of 2 invited lectures were carefully reviewed and selected from 155 submissions. The papers address all aspects of self-stabilization, safety and security, recovery oriented systems and programing, from theoretical contributions, to reports of the actual experience of applying the principles of self-stabilization to static and dynamic systems.
-
加密硬件与嵌入系统 - CHES 2006/会议录 Cryptographic hardware and embedded systemsLouis Goubin 等著This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006.The 32 revised full papers presented together with 3 invited talks were carefullyreviewed and selected from 112 submissions. The papers are organized in topical sections on side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, side channels, hardware attacks and countermeasures, efficient hardware, trusted computing, side channels, hardware attacks and countermeasures, as well as efficient hardware.
-
网络与信息安全系列课程实践教程侯整风 等主编计算机网络是信息社会的基础。计算机和网络的迅速普及,给国民经济发展和社会进步带来了前所未有的机遇。培养一大批熟谙网络与信息安全原理与技术、具有综合应用和设计创新能力的网络技术人才和信息安全人才,是社会发展的迫切需要,也是高校相关专业的重要职责。本书的目标是比较系统地提供网络原理、组网技术、网络应用、网络管理、网络安全、信息隐藏、密码算法及病毒防治等方面的实验教材,适应基础与验证性、综合与设计性两种不同层次的实验要求,教师可以根据讲授的课程、实验条件、实验时数以及学生的基础,从中选择合适的实验项目。本书适合作为信息安全、计算机应用技术及其相关专业本科高年级的实践教材,也适合企事业单位的网络管理人员、安全维护人员、系统管理人员和相关技术人员参考、阅读。
-
数字业务中的信任与保密Simone Fischer-Hübner 著This book constitutes the refereed proceedings of the Third International Conference on Trust and Privacy in Digital Business, TrustBus 2006, held in Krakow, Poland in September 2006 in conjunction with DEXA 2006.The 24 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.
-
安全数据管理Willem Jonker,Milan Petkovic 著This book constitutes the refereed proceedings of the Third VLDB 2006 International Workshop on Secure Data Management, SDM 2006, held in Seoul, Korea in September 2006 in conjunction with VLDB 2006.The 13 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers are organized in topical sections on privacy protection, privacy preserving data management, access control, and database security.
-
公钥基础结构Andrea S. Atzeni 著This book constitutes the refereed proceedings of the Third European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2006, held in Torino, Italy, in June 2006.The 18 revised full papers and 4 short papers presented were carefully reviewed and selected from about 50 submissions. The papers are organized in topical sections on PKI management, authentication, cryptography, applications, and short contributions.