本站支持尊重有效期内的版权/著作权,所有的资源均来自于互联网网友分享或网盘资源,一旦发现资源涉及侵权,将立即删除。希望所有用户一同监督并反馈问题,如有侵权请联系站长或发送邮件到ebook666@outlook.com,本站将立马改正
商品基本信息,请以下列介绍为准 | |
商品名称: | 密码学与百科全书 |
作者: | (荷)亨克·范蒂尔博格,(美)苏希尔·贾乔迪亚编 |
定价: | 399.0 |
出版社: | 科学出版社 |
出版日期: | 2018-05-01 |
ISBN: | 9787030323767 |
印次: | 1 |
版次: | 1 |
装帧: | 简装 |
开本: | 其他 |
内容简介 | |
《密码学与百科全书》汇聚了世界各地300多位密码学家和网络专家的成果结晶,系统、全面地介绍了密码学与网络等相关领域的专业术语1050条。《密码学与百科全书》以字母表为序将全部术语按照字行归类,共计25个部分。每条术语分为同义词、相关概念、定义、背景、理论、应用、公开问题和未来方向以及阅读等多个方行介绍,有利于读者对相关术行全面的理解和掌握。 |
目录 | |
目录 译者序 第二版前言 版前言 A 1 A5/1 1 访问控制(Access Control 2 从一个OS角度的访问控制(Access Control from an OS Security Perspective 7 访问控制列表(Access Control Lists 9 访问控制矩阵(Access Control Matrix 12 访问控制策略、模型和机制(Access Control Policies,Models,and Mechanisms 13 访问控制规则(Access Control Rules 14 访问限制(Access Limitation 14 访问列表(Access Lists 14 访问矩阵(Access Matrix 14 访问模式(Access Pattern 16 访问权限(Access Rights 19 访问结构(Access Structure 19 ACM 19 收单行(Acquirer 19 适应性选择密文攻击(Adaptive Chosen Ciphertext Attack 20 适应性选择明文和选择密文攻击(Adaptive Chosen Plaintext and Chosen Ciphertext Attack 20 适应性选择明文攻击(Adaptive Chosen Plaintext Attack 20 管理策略(Administrative Policies 21 SQL中管理策略(Administrative Policies in SQL 22 加密标准(Advanced Encryption Standard 23 哈希竞赛(Advanced Hash Competition 23 敌手的/外部知识(存在下的隐私 (Adversarial/External Knowledg Privacy in the Presence of 23 广告插件(Adware 26 AES 26 聚合签名(Aggregate Signature 26 AHS竞赛/SHA-3(AHS Competition/SHA-3 27 Alberti加密(Alberti Encryption 29 布尔函数的代数免疫(Algebraic Immunity of Boolean Functions 30 代数数域(Algebraic Number Field 31 算法复杂性攻击(Algorithmic Complexity Attacks 31 DoS算法(Algorithmic DoS 32 字母表(Alphabet 33 框架——理解移动手台性(Android’s Security Framework-Understanding the Security of Mobile Phone Platforms 34 异常制曲线(Anomalous Binary Curves 37 匿名性(Anonymity 37 数据挖掘中匿名性(Anonymity in Data Mining 38 匿名通信(Anonymous Communication 38 匿名路由(Anonymous Routing 38 匿名Web浏览和发布(Anonymous Web Browsing and Publishing 40 人体测量认证(Anthropometric Authentication 41 人体测量学(Anthropometrics 41 人体测量学(Anthropometry 42 抗DoS Cooki Anti-DoS Cookies 42 抗干扰策略(Anti-Jamming Strategy 42 基于发送者信誉的反垃圾邮件(Antispam Based on Sender Reputation 42 反病毒程序(Antivirus 42 应用层拒绝服务(Application-Level Denial of Service 42 对入侵检测的形式化方法的应用(Applications of Formal Methods to Intrusion Detection 44 对Web应用的形式化方法的应用(Applications of Formal Methods to Web Application Security 45 秩度量码应用(Applications of Rank-Metric Codes 47 ARIA 47 ARP毒性路由(APR (ARP Poison Routing(APR 48 ARP毒化(ARP Poisoning 48 ARP欺骗(ARP Spoofing 48 非对称密码系统(Asymmetric Cryptosystem 50 异步流密码(Asynchronous Stream Cipher 50 超立方上的饱和攻击(Attack by Summation Over an Hypercube 50 证明(Attestation 51 属性证书(Attribute Certificate 51 认证加密(Authenticated Encryption 52 认证(Authentication 62 认证令牌(Authentication Token 64 认证,从信息论的角度(Authentication,From an Information Theoretic Perspective 65 授权(Authorization 66 授权书(Authorizations 66 自相关(Autocorrelation 69 自切签名(Autotomic Signatures 69 可用性(Availability 69 B 71 银行卡(Bank Card 71 Barrett算法(Barrett’s Algorithm 71 物物交换(Barter 71 基(Base 71 Beaufort加密(Beaufort Encryption 71 Bell-LaPadula保密模型(Bell-LaPadula Confidentiality Model 72 Bell-LaPadula模型(Bell-LaPadula Model 74 Berlekamp Q-矩阵(Berlekamp Q-matrix 78 Berlekamp-Massey算法(Berlekamp- Massey Algorithm 79 Biba完整性模型(Biba Integrity Model 80 Biba强制完整性策略(Biba Mandatory Integrity Policy 81 Biba模型(Biba Model 81 大数乘法(Big Number Multiplication 82 大方(Big Number Squaring 82 双线性对(Bilinear Pairings 82 制欧几里得算法(Binary Euclidean Algorithm 82 制求幂(Binary Exponentiation 84 二元函数(Binary Functions 86 制GCD算法(Binary GCD Algorithm 86 绑定模式(Binding Pattern 86 二项分布(Binomial Distribution 86 生物特征身份验证(Biometric Authentication 87 生物特征密码系统(Biometric Cryptosystem 90 生物特征加密(Biometric Encryption 90 生物特征融合(Biometric Fusion 98 监控中的生物(Biometric Identification in Video Surveillance 98 生物特征信息伦理(Biometric Information Ethics 98 生物特征密钥生成(Biometric Key Generation 98 生物特征密钥(Biometric Keys 98 生物特征匹配(Biometric Matching 98 生物特征护照(Biometric Passport Security 101 生物特征性能评估(Biometric Performance Evaluation 101 生物特征隐私(Biometric Privacy 101 生物(Biometric Recognition 104 生物特征样本质量(Biometric Sample Quality 104 生物特征传感器(Biometric Sensors 110 生物特征社会责任(Biometric Social Responility 113 生物识别系统评估(Biometric Systems Evaluation 116 生物特征技术与性——生物特征标准研发活动(Biometric Technologies and Security-International Biometric Standards Development Activities 122 生物特征测试(Biometric Testing 127 生物特征取证(Biometrics for Forensics 128 用于身份管理和应用领域的生物特征(Biometrics for Identity Management and Fields of Application 131 监控中的生物识别技术(Biometrics in Video Surveillance 135 生物识别技术:术语和定义(Biometrics:Terms and Definitions 138 BIOS基本输入输出系统(BIOS Basic Input Output System 142 生日悖论(Birthday Paradox 143 黑盒算法(Black Box Algorithms 143 勒索攻击(Bla Attacks 143 盲签名(Blind Signature 144 致盲技术(Blinding Techniques 146 分组密码(Block Ciphers 147 Blowfish 153 BLP 154 BLP模型(BLP Model 154 BLS短数字签名(BLS Short Digital Signatures 154 Blum整数(Blum Integer 155 Blum-Blum-Shub伪随机比特发生器(Blum-Blum-Shub Pseudorandom Bit Generator 156 Blum-Goldwasse |