| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Software Security
Extending .NET Security to Unmanaged Code
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation
Privacy and Anonymity
Low Latency Anonymity with Mix Rings
Breaking Four Mix-Related Schemes Based on Universal Re-encryption
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy
Protecting Data Privacy Negative Databases Through Hard-to-Reverse
Block Ciphers and Hash Functions
Related-Key Rectangle Attack on 42-Round SHACAL-2
On the Collision Resistance of RIPEMD-160
Digital Signatures
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption
Multi-party Concurrent Signatures
Formal Security Model of Multisignatures
Cryptanalysis of Variants of UOV
Stream Ciphers
TRIVIUM: A Stream Cipher Construction Inspired by Block Cipher Design Principles
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's
Encryption I
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search
Collusion-Free Policy-Based Encryption
Pervasive Computing
Using Multiple Smart Cards for Signing Messages at Malicious Terminals
Diverging Keys in Wireless Sensor Networks
Encryption II
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption
Transparent Image Encryption Using Progressive JPEG
Network Security
Watermarking and DRM
Intrusion Detection and Worms
Key Exchange
Securtiy Protocols and Formal Methods
Information Systems Security
Author Index