²é¿´: 3636  |  »Ø¸´: 8

biggglt

гæ (³õÈëÎÄ̳)

[ÇóÖú] ÇóÖú¡«ÐÅÏ¢°²È«·½ÃæÈ¨Íþ¹úÍâÆÚ¿¯ÍƼö¼¸±¾£¿

ÇóÍÆ¼ö¼¸±¾ÖµµÃÒ»¿´µÄsciÆÚ¿¯£¬»òÕß¼¸¸öÏà¹Ø·½ÃæÅ£È˵ÄÃû×Ö£¬·½±ãÎÒÈ¥ËÑË÷£¬Ð»Ð»£¡²àÖØÓÚÐÅÏ¢°²È«ÀïÃæµÄÒÆ¶¯»¥ÁªÍø°²È«Ö®Àà

[ Last edited by biggglt on 2012-10-23 at 16:27 ]
»Ø¸´´ËÂ¥

» ÊÕ¼±¾ÌûµÄÌÔÌûר¼­ÍƼö

ÎÄÏ×ѧϰ kidnappman ÁÙʱ ´ýÓÃ

» ²ÂÄãϲ»¶

» ±¾Ö÷ÌâÏà¹Ø¼ÛÖµÌùÍÆ¼ö£¬¶ÔÄúͬÑùÓаïÖú:

ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

any0way

½ð³æ (СÓÐÃûÆø)

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï
¸Ðл²ÎÓ룬ӦÖúÖ¸Êý +1
biggglt: ½ð±Ò+1, ¡ï¡ï¡ïºÜÓаïÖú 2012-10-24 16:56:18
IEEE TIFS(Transactions on Information Forensics and Security)
IET Information Security
Computer&Security
Õ⼸¸ö±È½ÏÏà¹Ø£¬¶¼ÊDZȽÏÖ÷Á÷µÄ£¬ÆäËüµÄ¾Í²»Ì«È·¶¨ÁË¡£·¢ÏÖеÄÔٻظ´Äã¡£

[ ·¢×ÔÊÖ»ú°æ http://muchong.com/3g ]

» ±¾ÌûÒÑ»ñµÃµÄºì»¨£¨×îÐÂ10¶ä£©

2Â¥2012-10-23 17:04:31
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

kidnappedman

½ð³æ (ÕýʽдÊÖ)

ÒýÓûØÌû:
2Â¥: Originally posted by any0way at 2012-10-23 17:04:31
IEEE TIFS(Transactions on Information Forensics and Security)
IET Information Security
Computer&Security
Õ⼸¸ö±È½ÏÏà¹Ø£¬¶¼ÊDZȽÏÖ÷Á÷µÄ£¬ÆäËüµÄ¾Í²»Ì«È·¶¨ÁË¡£·¢ÏÖеÄÔٻظ´Äã¡£
...

IET Information Security
Õâ¸öÒ²Ë㣿
3Â¥2012-10-23 18:58:10
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

any0way

½ð³æ (СÓÐÃûÆø)

ÒýÓûØÌû:
3Â¥: Originally posted by kidnappedman at 2012-10-23 18:58:10
IET Information Security
Õâ¸öÒ²Ë㣿...

Õâ¸öÏà±ÈTIFSÓвî¾à£¬µ«ÊÇÀïÃæÓÐЩÎÄÕ»¹ÊÇ¿ÉÒÔÒ»¿´µÄ¡£
4Â¥2012-10-23 19:41:43
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

zOOmAId

ľ³æ (ÕýʽдÊÖ)

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï ¡ï ¡ï ¡ï
conanwj: ½ð±Ò+3, Ó¦ÖúÖ¸Êý+1, ¾«»ª¸úÌû 2012-10-24 07:57:35
conanwj: »ØÌûÖö¥ 2012-10-24 07:57:40
biggglt: ½ð±Ò+1, ¡ï¡ï¡ïºÜÓаïÖú 2012-10-24 16:56:09
ÍøÂçÓëÐÅÏ¢°²È«
________________________________________________________________________________
Öйú¼ÆËã»úѧ»áÍÆ¼ö¹ú¼ÊѧÊõ¿¯Îï
¡¡(ÍøÂçÓëÐÅÏ¢°²È«¼ÆË㣩
Ò»¡¢AÀà
ÐòºÅ¿¯Îï¼ò³Æ¿¯ÎïÈ«³Æ³ö°æÉçÍøÖ·1
TISSEC
ACM Transactions on Information and System Security
ACM
http://tissec.acm.org/2
TDSC
IEEE Transactions on Dependable and Secure Computing
IEEE
http://www.computer.org/tdsc/3
TIFS
IEEE Transactions on Information Forensics
and Security
IEEE
http://www.ieee.org/organizations/society/sp/tifs.html4

Journal of Cryptology
Springer
http://www.iacr.org/jofc/jofc.html
¶þ¡¢BÀà
ÐòºÅ¿¯Îï¼ò³Æ¿¯ÎïÈ«³Æ³ö°æÉçÍøÖ·1

Computers & Security
Elsevier
http://www.elsevier.nl/inca/publications/store/
4/0/5/8/7/7/2

Designs, Codes and Cryptography
Springer
http://www.springer.com/east/home/math/numbers
?SGWID=5-10048-70-35730330-03

IEEE Security & Privacy
IEEE
http://www.computer.org/security/4

International Journal of Information Security
and Privacy
Idea Group
Inc
http://journalseek.net/cgi-bin/journalseek/journalsearch.
cgi?field=issn&query=1930-16505
JCS
Journal of Computer Security
IOS Press
http://www2.csl.sri.com/jcs/
Èý¡¢CÀà
ÐòºÅ¿¯Îï¼ò³Æ¿¯ÎïÈ«³Æ³ö°æÉçÍøÖ·1
CISDA
Computational Intelligence for Security and Defense Applications
IEEE
http://www.cidefense.org/2
CLSR
Computer Law and Security Reports
Elsevier
http://www.sciencedirect.com/science/journal/
026736493

EURASIP Journal on Information Security
Hindawi
http://www.hindawi.com/journals/is4

IET Information Security
IET
http://www.ietdl.org/IET-IFS5

Information Management & Computer Security
MCB
University
Press
http://www.emeraldinsight.com/info/journals/imcs
/imcs.jsp6

Information Security Technical Report
Elsevier
http://www.elsevier.com/locate/istr7
JISec
Journal of Internet Security
Nahum
Goldmann.
http://www.addsecure.net/JiSec/index.asp

Öйú¼ÆËã»úѧ»áÍÆ¼ö¹ú¼ÊѧÊõ»áÒé
¡¡(ÍøÂçÓëÐÅÏ¢°²È«¼ÆË㣩
Ò»¡¢AÀà
ÐòºÅ»áÒé¼ò³Æ»áÒéÈ«³Æ³ö°æÉçÍøÖ·1
CCS
ACM Conference on Computer and
Communications Security
ACM
http://www.acm.org/sigs/sigsac/ccs/2
S&P
IEEE Symposium on Security and Privacy
IEEE
http://www.ieee-security.org/TC/SP-Index.html3
CRYPTO
International Cryptology Conference
Springer
http://www.iacr.org/conferences/
¶þ¡¢BÀà
ÐòºÅ»áÒé¼ò³Æ»áÒéÈ«³Æ³ö°æÉçÍøÖ·1
ACSAC
Annual Computer Security Applications
Conference
IEEE
http://www.acsac.org/2
ASIACRYPT
Annual International Conference on the Theory
and Application of Cryptology and Information
Security
Springer
http://www.iacr.org/conferences/3
Eurocrypt
Annual International Conference on the Theory
and Applications of Cryptographic Techniques
Springer
http://www.iacr.org/conferences/eurocrypt2009/4
ESORICS
European Symposium on Research in
Computer Security
Springer
http://www.laas.fr/%7Eesorics/5
CSFW
IEEE Computer Security Foundations
Workshop

http://www.ieee-security.org/CSFWweb/6
RAID
International Symposium on Recent Advances
in Intrusion Detection
Springer
http://www.raid-symposium.org/7
NDSS
ISOC Network and Distributed System
Security Symposium
Internet
Society
http://www.isoc.org/isoc/conferences/ndss/8
DSN
The International Conference on Dependable
Systems and Networks
IEEE/IFIP
http://www.dsn.org/9
TCC
Theory of Cryptography Conference
Springer
http://cs.nyu.edu/~tcc08/10
Security
USENIX Security Symposium
USENIX
http://www.usenix.org/events/11
IH
Workshop on Information Hiding
Springer
http://www.cl.cam.ac.uk/~rja14/ihws.html
Èý¡¢CÀà
ÐòºÅ»áÒé¼ò³Æ»áÒéÈ«³Æ³ö°æÉçÍøÖ·1WiSec
ACM Conference on Wireless Network
Security Supersedes WiSe (ACM Workshop
on Wireless Security) andSASN (ACM
Workshop on Security of Ad-Hoc and Sensor
Networks)
ACM
http://www.sigsac.org/wisec/2ACM
MM&SEC
ACM Multimedia and Security Workshop
ACM
http://www.mmsec10.com/3SACMAT
ACM Symposium on Access Control Models
and Technologies
ACM
http://www.sacmat.org/4SAC
ACM Symposium on Applied Computing
ACM
http://www.acm.org/conferences/sac/5ASIACCS
ACM Symposium on Information, Computer
and Communications Security
ACM
http://dsns.csie.nctu.edu.tw/asiaccs/6DRM
ACM Workshop on Digital Rights Management
ACM
http://www.almaden.ibm.com/cs/people/hongxia-
jin/DRM2009/7WORM
ACM Workshop on Rapid Malcode
ACM
http://www.eecs.umich.edu/~farnam/worm2006.html8SASN
ACM Workshop on Security of Ad-Hoc and
Sensor Networks
ACM
http://www.cse.psu.edu/~szhu/SASN2006/9WiSe
ACM Workshop on Wireless Security
ACM
http://www.ece.cmu.edu/~adrian/wise2004/10ACNS
Applied Cryptography and Network Security
Springer
http://www.geocities.com/acns_home/11ACISP
Australasia Conference on Information Security
and Privacy
Springer
http://user.gs.rmit.edu.au/infosec/ACISP2011/12DFRWS
Digital Forensic Research Workshop
Elsevier
http://www.dfrws.org/13FSE
Fast Software Encryption
Springer
http://fse2008.epfl.ch/14FC
Financial Cryptography
Springer
http://fc08.ifca.ai/15DIMVA
GI SIG SIDAR Conference on Detection of
Intrusions and Malware and Vulnerability
AssessmentSpringer
http://dimva2010.fkie.fraunhofer.de/16IWIA
IEEE International Information Assurance
WorkshopIEEE
http://www.iwia.org/17IAW
IEEE SMC Information Assurance
WorkshopIEEE
http://www.itoc.usma.edu/workshop18SEC
IFIP International Information Security Conference
Elsevier
http://www.sec2011.org/19IFIP WG
11.9
IFIP WG 11.9 International Conference on
Digital ForensicsSpringer
http://www.ifip119.org/Conferences/20ISC
Information Security Conference
Springer
http://isc08.twisc.org/21ICICS
International Conference on Information and
Communications SecuritySpringer
http://discovery.csc.ncsu.edu/ICICS06/22Secure
Comm
International Conference on Security and Privacy
in Communication NetworksACM
http://www.securecomm.org/23PKC
International Workshop on Practice and Theory
in Public Key CryptographySpringer
http://www.iacr.org/workshops/pkc2008/24NSPW
New Security Paradigms Workshop
ACM
http://www.nspw.org/current/25CT-RSA
RSA Conference, Cryptographers' Track
Springer
http://www.informatik.uni-trier.de/~ley/db/conf/ctrsa/26SRUTI
Steps to Reducing Unwanted Traffic on the
InternetUSENIX
http://www.usenix.org/events/27SOUPS
Symposium On Usable Privacy and Security
ACM
http://cups.cs.cmu.edu/soups/2011/28HotSec
USENIX Workshop on Hot Topics in Security
USENIX
http://www.usenix.org/events/29HotBots
USENIX Workshop on Hot Topics in
Understanding BotnetsUSENIX
http://www.usenix.org/event/hotbots07/tech/30CHES
Workshop on Cryptographic Hardware and
Embedded SystemsSpringer
http://www.chesworkshop.org/
Ðе½Ë®¸FÌŽ×ø¿´ë…Æð•r
5Â¥2012-10-23 21:49:36
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

biggglt

гæ (³õÈëÎÄ̳)

ËÍÏÊ»¨Ò»¶ä
ÒýÓûØÌû:
2Â¥: Originally posted by any0way at 2012-10-23 17:04:31
IEEE TIFS(Transactions on Information Forensics and Security)
IET Information Security
Computer&Security
Õ⼸¸ö±È½ÏÏà¹Ø£¬¶¼ÊDZȽÏÖ÷Á÷µÄ£¬ÆäËüµÄ¾Í²»Ì«È·¶¨ÁË¡£·¢ÏÖеÄÔٻظ´Äã¡£
...

Íò·Ö¸Ðл£¡ÁíÍâÇëÎÊÕâЩÆÚ¿¯ÀïµÄ×îÐÂÎÄÕÂÒ»°ãÊÇÈçºÎ»ñµÃ°¡£¿ÎÒÓùȸèreaderºÃÏñû·¨¶©ÔÄËùÓÐÆÚ¿¯

[ ·¢×ÔÊÖ»ú°æ http://muchong.com/3g ]
6Â¥2012-10-24 07:00:51
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

biggglt

гæ (³õÈëÎÄ̳)

ÒýÓûØÌû:
5Â¥: Originally posted by zOOmAId at 2012-10-23 21:49:36
ÍøÂçÓëÐÅÏ¢°²È«
________________________________________________________________________________
Öйú¼ÆËã»úѧ»áÍÆ¼ö¹ú¼ÊѧÊõ¿¯Îï
¡¡(ÍøÂçÓëÐÅÏ¢°²È«¼ÆË㣩
Ò»¡¢AÀà
ÐòºÅ¿¯Îï¼ò³Æ¿¯ÎïÈ«³Æ³ö°æÉçÍøÖ·1
T ...

лл£¡ÎÒÊÇÐÂÈëÊÖÕâ¸ö·½Ïò£¬ÊDz»ÊÇÏȹØ×¢aÀàÆÚ¿¯¾Í¹»ÁË£¿

[ ·¢×ÔÊÖ»ú°æ http://muchong.com/3g ]
7Â¥2012-10-24 07:02:47
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

any0way

½ð³æ (СÓÐÃûÆø)

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

ÒýÓûØÌû:
6Â¥: Originally posted by biggglt at 2012-10-24 07:00:51
Íò·Ö¸Ðл£¡ÁíÍâÇëÎÊÕâЩÆÚ¿¯ÀïµÄ×îÐÂÎÄÕÂÒ»°ãÊÇÈçºÎ»ñµÃ°¡£¿ÎÒÓùȸèreaderºÃÏñû·¨¶©ÔÄËùÓÐÆÚ¿¯
...

ÕâЩ¶¼ÊÇÊշѵģ¬Ò»°ãѧУ»á¹ºÂòÏàÓ¦µÄ¿â£¬ÈçIEEE,Elsevier,SpringerµÈ£¬Í¨¹ýѧУÏÂÔØ¡£

[ ·¢×ÔÊÖ»ú°æ http://muchong.com/3g ]
8Â¥2012-10-24 08:42:38
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

jiliang0313

½ð³æ (ÖøÃûдÊÖ)

Dr.

ÐÅÏ¢°²È«ÁìÓòµÄ¶¥¼¶ÆÚ¿¯Ö»ÓÐÈý¸ö£¨²Î¿¼CCFÍÆ¼öÆÚ¿¯ºÍ»áÒéĿ¼£©£º
1
TDSC
IEEE Transactions on Dependable and Secure Computing

IEEE
http://www.computer.org/portal/web/tdsc
2        
TIFS
IEEE Transactions on Information Forensics and Security        
IEEE
http://www.signalprocessingsociety.org/publications
/periodicals/forensics/forensics-authors-info/
3        Journal of Cryptology        
Springer
http://www.iacr.org/jofc/jofc.html

ÓÐ ¼¸¸öµã×¢Ò⣺ÆÚ¿¯ÖÊÁ¿²»È¡¾öÓëSCI»¹ÊÇSCIE£¬´ó°ÑµÄSCIE±ÈSCIºÃ¡£ACMµÄIEEEµÄÖÊÁ¿²»ºÃ˵˭±ÈË­ºÃ¡£TIFS×÷ΪÐÅÏ¢°²È«µÄ¶¥¼¶£¬Ä¿Ç°ÔÚ¹úÄÚÔÚhardware security and trustedÁìÓò»¹Ã»ÓÐÎÄÕ¡£Journal of Cryptology        ¾Ý˵´ó½ѧÕß½ü10Ä궼ûÎÄÕÂÁË£¬²»ÖªµÀÊÇ·ñÕâÑù¡£TDSCÊÇ¿ÉÐżÆËãµÄ¶¥¼¶¡£ACM Transactions on Information and System Security±ÈÇ°ÃæÈý¸ö²îµãÊôÓÚBÀàÆÚ¿¯¡£
9Â¥2014-01-08 07:23:38
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ biggglt µÄÖ÷Ìâ¸üÐÂ
×î¾ßÈËÆøÈÈÌûÍÆ¼ö [²é¿´È«²¿] ×÷Õß »Ø/¿´ ×îºó·¢±í
[¿¼ÑÐ] 0703»¯Ñ§µ÷¼Á£¬Çó¸÷λÀÏʦÊÕÁô +9 ÇïÓÐľ±± 2026-03-14 9/450 2026-03-18 19:49 by macy2011
[¿¼ÑÐ] 0703»¯Ñ§µ÷¼Á £¬Áù¼¶Òѹý£¬ÓпÆÑо­Àú +10 êØÎõÙâ 2026-03-15 10/500 2026-03-18 14:19 by 007_lilei
[¿¼ÑÐ] ÊÕ¸´ÊÔµ÷¼ÁÉú +4 ÓêºóÇïºÉ 2026-03-18 4/200 2026-03-18 14:16 by elevennnne
[¿¼ÑÐ] ²ÄÁÏר˶274Ò»Ö¾Ô¸ÉÂÎ÷ʦ·¶´óѧÇóµ÷¼Á +6 Ñ¦ÔÆÅô 2026-03-13 6/300 2026-03-18 14:14 by ÍÑÓ±¶ø³ö
[¿¼ÑÐ] 303Çóµ÷¼Á +4 î£08 2026-03-17 6/300 2026-03-18 11:01 by Iveryant
[¿¼ÑÐ] 0703»¯Ñ§µ÷¼Á +3 ÄÝÄÝninicgb 2026-03-17 3/150 2026-03-18 10:29 by macy2011
[¿¼ÑÐ] 265Çóµ÷¼Á +3 ÁºÁºÐ£Ð£ 2026-03-17 3/150 2026-03-18 09:12 by zhukairuo
[¿¼ÑÐ] 301Çóµ÷¼Á +9 yyÒªÉϰ¶Ñ½ 2026-03-17 9/450 2026-03-18 08:58 by Î޼ʵIJÝÔ­
[¿¼ÑÐ] 296Çóµ÷¼Á +5 ´ó¿Ú³Ô·¹ ÉíÌ彡 2026-03-13 5/250 2026-03-17 21:05 by ²»»ó¿ÉÀÖ
[¿¼ÑÐ] 326Çóµ÷¼Á +5 Éϰ¶µÄСÆÏ 2026-03-15 6/300 2026-03-17 17:26 by ruiyingmiao
[¿¼ÑÐ] 085601Çóµ÷¼Á +4 Du.11 2026-03-16 4/200 2026-03-17 17:08 by ruiyingmiao
[¿¼ÑÐ] Ò»Ö¾Ô¸ÄϾ©´óѧ£¬080500²ÄÁÏ¿ÆÑ§Ó빤³Ì£¬µ÷¼Á +4 Jy? 2026-03-16 4/200 2026-03-17 11:02 by gaoqiong
[¿¼ÑÐ] 285»¯¹¤Ñ§Ë¶Çóµ÷¼Á£¨081700£© +9 ²ñ¿¤Ã¨_ 2026-03-12 9/450 2026-03-17 10:18 by Sammy2
[¿¼ÑÐ] 278Çóµ÷¼Á +3 Yy7400 2026-03-13 3/150 2026-03-17 08:24 by laoshidan
[¿¼ÑÐ] 11408 Ò»Ö¾Ô¸Î÷µç£¬277·ÖÇóµ÷¼Á +3 zhouzhen654 2026-03-16 3/150 2026-03-17 07:03 by laoshidan
[¿¼ÑÐ] 085600µ÷¼Á +5 ÑúÑú123sun 2026-03-12 6/300 2026-03-16 15:58 by ÑúÑú123sun
[¿¼ÑÐ] 0703 ÎïÀí»¯Ñ§µ÷¼Á +3 ÎÒ¿ÉÒÔÉϰ¶µÄ¶Ô 2026-03-13 5/250 2026-03-16 10:50 by ÎÒ¿ÉÒÔÉϰ¶µÄ¶ÔÂ
[¿¼ÑÐ] ÇóÀÏʦÊÕÁôµ÷¼Á +4 jiang½ª66 2026-03-14 5/250 2026-03-15 20:11 by Winj1e
[¿¼ÑÐ] Çó²ÄÁϵ÷¼Á 085600Ó¢Ò»Êý¶þ×Ü·Ö302 ǰÈý¿Æ235 ¾«Í¨»úÆ÷ѧϰ Ò»Ö¾Ô¸¹þ¹¤´ó +4 ÁÖyaxin 2026-03-12 4/200 2026-03-13 22:04 by ÐÇ¿ÕÐÇÔÂ
[¿¼ÑÐ] 0817»¯Ñ§¹¤³ÌÓë¼¼Êõ¿¼ÑÐ312·Öµ÷¼Á +3 T123 tt 2026-03-12 3/150 2026-03-13 10:49 by houyaoxu
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û