书籍详情
标识鉴别:网际安全技术基础

作者:南相浩 著
出版社:电子工业出版社
出版时间:2011-06-01
ISBN:9787121134791
定价:¥88.00
购买这本书可以去
内容简介
The latest version of CPK (v6. 0) isrealized on chip. The CPK-chip carries CPK-cryptosystem to a newstage of development. The chip not only has the function ofsignature and verification, but also has the function of encryptionand decryption without any outside support. CPK can solve the hardproblem of scaled identity authentication, minimizing the threat ofattack ( cloud computing, quantum computing and collusion). CPK canadvance the authentication logic from \belief logic\ and \trustlogic\ to \truth logic\. The truth logic is the foundation ofconstructing authenticated (trus ted) connecting, computing,transaction, logistics, counter - forgery, and so on. Readersbenefited from this book will be researchers and professors,experts and students, engi neers and policy makers, and all otherswho are interested in cyber security.
作者简介
暂缺《标识鉴别:网际安全技术基础》作者简介
目录
Part One Authentication Technology
Chapter 1 Basic Concepts
Part Two Cryptosystems
Chapter 2 Authentication Logics
Chapter 3 Identity Authentication
Chapter 4 Combined Public Key (v6.0)
Chapter 5 Cryptosystem and Authentication
Chapter 6 Bytes Encryption
Part Three CPK System
Chapter 7 CPK Key Management
Chapter 8 CPK-chip Design
Chapter 9 CPK ID-card
Part Four Code Authenticaiton
Chapter 10 Software ID Authentication
Chapter 11 Windows Code Authentication
Chapter 12 Linux Code Authentication
Part Five Communication Authentication
Chapter 13 Phone Authentication
Chapter 14 SSL Communication Authentication
Chapter 15 Router Communication Authentication
Part Sixe-Commerce Authentication
Chapter 16 e-Bank Authentication
Chapter 17 e-Bill Authentication
Part Seven Logistics Authentication
Chapter 18 e-Tag Authentication
Chapter 19 e-Wallet Authentication
Part Eight Stored File Authentication
Chapter 20 Storage Authentication
Chapter 21 Secure File Box
Chapter 22 Classification Seal Authentication
Part Nine Moving Data Authentication
Chapter 23 e-Mail Authentication
Chapter 24 Digital Right Authentication
Part TenNetwork Authentication
Chapter 25 Pass Authentication
Chapter 26 Address Authentication
Appendices
References
Glossary
Technical Terms
Symbols
Chapter 1 Basic Concepts
Part Two Cryptosystems
Chapter 2 Authentication Logics
Chapter 3 Identity Authentication
Chapter 4 Combined Public Key (v6.0)
Chapter 5 Cryptosystem and Authentication
Chapter 6 Bytes Encryption
Part Three CPK System
Chapter 7 CPK Key Management
Chapter 8 CPK-chip Design
Chapter 9 CPK ID-card
Part Four Code Authenticaiton
Chapter 10 Software ID Authentication
Chapter 11 Windows Code Authentication
Chapter 12 Linux Code Authentication
Part Five Communication Authentication
Chapter 13 Phone Authentication
Chapter 14 SSL Communication Authentication
Chapter 15 Router Communication Authentication
Part Sixe-Commerce Authentication
Chapter 16 e-Bank Authentication
Chapter 17 e-Bill Authentication
Part Seven Logistics Authentication
Chapter 18 e-Tag Authentication
Chapter 19 e-Wallet Authentication
Part Eight Stored File Authentication
Chapter 20 Storage Authentication
Chapter 21 Secure File Box
Chapter 22 Classification Seal Authentication
Part Nine Moving Data Authentication
Chapter 23 e-Mail Authentication
Chapter 24 Digital Right Authentication
Part TenNetwork Authentication
Chapter 25 Pass Authentication
Chapter 26 Address Authentication
Appendices
References
Glossary
Technical Terms
Symbols
猜您喜欢



