注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當前位置: 首頁出版圖書科學技術計算機/網(wǎng)絡信息安全信息安全/會議錄

信息安全/會議錄

信息安全/會議錄

定 價:¥768.40

作 者: Sokratis K. Katsikas 著
出版社: 崇文書局(原湖北辭書出版社)
叢編項:
標 簽: 暫缺

購買這本書可以去


ISBN: 9783540383413 出版時間: 2006-12-01 包裝: 平裝
開本: 頁數(shù): 字數(shù):  

內容簡介

  This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006.The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on software security, privacy and anonymity, block ciphers and hash functions, digital signatures, stream ciphers, encryption, pervasive computing, network security, watermarking and digital rights management, intrusion detection and worms, key exchange, security protocols and formal methods, and information systems security.

作者簡介

暫缺《信息安全/會議錄》作者簡介

圖書目錄

Software Security
Extending .NET Security to Unmanaged Code
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation
Privacy and Anonymity
Low Latency Anonymity with Mix Rings
Breaking Four Mix-Related Schemes Based on Universal Re-encryption
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy
Protecting Data Privacy Negative Databases Through Hard-to-Reverse
Block Ciphers and Hash Functions
Related-Key Rectangle Attack on 42-Round SHACAL-2
On the Collision Resistance of RIPEMD-160
Digital Signatures
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
Multi-party Concurrent Signatures
Formal Security Model of Multisignatures
Cryptanalysis of Variants of UOV
Stream Ciphers
TRIVIUM: A Stream Cipher Construction Inspired by Block Cipher Design Principles
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's
Encryption I
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
Collusion-Free Policy-Based Encryption
Pervasive Computing
Using Multiple Smart Cards for Signing Messages at Malicious Terminals
Diverging Keys in Wireless Sensor Networks
Encryption II
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
Transparent Image Encryption Using Progressive JPEG
Network Security
Watermarking and DRM
Intrusion Detection and Worms
Key Exchange
Securtiy Protocols and Formal Methods
Information Systems Security
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) www.autoforsalebyowners.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號