注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
讀書(shū)網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書(shū)科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全信息安全/會(huì)議錄

信息安全/會(huì)議錄

信息安全/會(huì)議錄

定 價(jià):¥768.40

作 者: Sokratis K. Katsikas 著
出版社: 崇文書(shū)局(原湖北辭書(shū)出版社)
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買這本書(shū)可以去


ISBN: 9783540383413 出版時(shí)間: 2006-12-01 包裝: 平裝
開(kāi)本: 頁(yè)數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006.The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on software security, privacy and anonymity, block ciphers and hash functions, digital signatures, stream ciphers, encryption, pervasive computing, network security, watermarking and digital rights management, intrusion detection and worms, key exchange, security protocols and formal methods, and information systems security.

作者簡(jiǎn)介

暫缺《信息安全/會(huì)議錄》作者簡(jiǎn)介

圖書(shū)目錄

Software Security
Extending .NET Security to Unmanaged Code
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation
Privacy and Anonymity
Low Latency Anonymity with Mix Rings
Breaking Four Mix-Related Schemes Based on Universal Re-encryption
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy
Protecting Data Privacy Negative Databases Through Hard-to-Reverse
Block Ciphers and Hash Functions
Related-Key Rectangle Attack on 42-Round SHACAL-2
On the Collision Resistance of RIPEMD-160
Digital Signatures
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
Multi-party Concurrent Signatures
Formal Security Model of Multisignatures
Cryptanalysis of Variants of UOV
Stream Ciphers
TRIVIUM: A Stream Cipher Construction Inspired by Block Cipher Design Principles
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's
Encryption I
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
Collusion-Free Policy-Based Encryption
Pervasive Computing
Using Multiple Smart Cards for Signing Messages at Malicious Terminals
Diverging Keys in Wireless Sensor Networks
Encryption II
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
Transparent Image Encryption Using Progressive JPEG
Network Security
Watermarking and DRM
Intrusion Detection and Worms
Key Exchange
Securtiy Protocols and Formal Methods
Information Systems Security
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書(shū)網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)