信息安全
-
隐私增强技术George Danezis 著This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May/June 2005.The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application context.
-
信息安全及密码术Helger Lipmaa 著This book constitutes the refereed proceedings of the Second SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2006 (formerly CISC), held in Beijing, China in November/December 2006.The 23 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in topical sections on digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security.
-
击退黑客Robert Schifreen 著The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on computers and the Internet as well as the rapid spread of broadband into more households has resulted in a feeding ground for hackers around the world. Estimated damage costs are now making their way into the billions. The need for some good advice is long overdue. Robert Schifreen, a self-confessed ex-hacker, made history in 1985 when he became the first person in the world to face a jury trial in connection with computer hacking. His subsequent acquittal in the High Court led to a change in UK Law and the introduction of the Computer Misuse Act 1990. His 20 years experience in IT security now lends itself to global radio and TV broadcasts, as well as appearances at conferences and lectures around the world. Keeping your company’s computers free from hackers, viruses, spammers, phishing attacks, social engineers and all the other things that can result in loss of data is a difficult job. Defeating the Hacker is a book about how to protect your computer systems becoming another victim of the hacker. It’s an instant primer into all the things that can go wrong, with advice on how to stop it happening or, if it’s too late, how to fix the damage. Presents unique, UK based, insider information on hacking and security from someone who has operated on both sides of the divide:Develops a populist seam within a hot IT area: security;Shows readers how and why hacking is made possible, whilst suggesting ways to avoid being a victim of it;Written in a dynamic, conversational, yet knowledgeable, style;Filled with information and anecdotal evidence aimed at IT professionals and those with a more general interest;Defeating the Hacker allows the reader to learn how to protect their computer systems with advice from someone who knows how to break into them.作者简介:Robert Schifreen writes and speaks on IT security at seminars and conferences around the world, and has appeared on radio and TV as an expert spokesman around 100 times in the past 6 years.
-
密码术的选择区Douglas R. Stinson 著This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000.The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.
-
信息系统安全Aditya Bagchi 著This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006.The 20 revised full papers and 5 short papers presented together with 4 invited papers and 3 ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security and are organized in topical sections on data and application security, access control, key management and security in wireless networks, threat analysis, detection and recovery, cryptography and encryption, as well as short papers and research reports.
-
信息及通信安全Peng Ning 等著This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA in December 2006.The 22 revised full papers and 17 revised short papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on security protocols, applied cryptography, access control and systems security, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, as well as security implementations.
-
快速软件加密法Matt Robshaw 著This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006.The 27 revised full papers presented were carefully reviewed and selected from more than 100 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.
-
密码学进展—CT-RSA 2001David Naccache 著This book constitutes the refereed proceedings of the Cryptographers' Track at RSA Conference 2001, CT-RSA 2001, in San Francisco, CA, USA in April 2001.The 33 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on new cryptosystems; RSA; symmetric cryptography; gambling and lotteries; reductions, constructions, and security proofs; flaws and attacks; implementation; multivariate cryptography; number theoretic problems; passwords and credentials; and protocols.
-
快速软件加密术Joan Daemen 著This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Fast Software Encryption, FSE 2002, held in Leuven, Belgium in February 2002.The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends.
-
信息与计算安全新趋向/会议录Günter Müller 著This book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication Security, ETRICS 2006, held in Freiburg, Germany, in June 2006.The 36 revised full papers presented were carefully reviewed and selected from around 180 submissions. The papers are organized in topical sections on multilateral security; security in service-oriented computing, secure mobile applications; enterprise privacy; privacy, identity, and anonymity; security engineering; security policies; security protocols; intrusion detection; and cryptographic security.