注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計算機/網(wǎng)絡(luò)信息安全標(biāo)識鑒別:網(wǎng)際安全技術(shù)基礎(chǔ)

標(biāo)識鑒別:網(wǎng)際安全技術(shù)基礎(chǔ)

標(biāo)識鑒別:網(wǎng)際安全技術(shù)基礎(chǔ)

定 價:¥88.00

作 者: 南相浩 著
出版社: 電子工業(yè)出版社
叢編項:
標(biāo) 簽: 信息安全

ISBN: 9787121134791 出版時間: 2011-06-01 包裝: 精裝
開本: 16開 頁數(shù): 262 字數(shù):  

內(nèi)容簡介

  The latest version of CPK (v6. 0) isrealized on chip. The CPK-chip carries CPK-cryptosystem to a newstage of development. The chip not only has the function ofsignature and verification, but also has the function of encryptionand decryption without any outside support. CPK can solve the hardproblem of scaled identity authentication, minimizing the threat ofattack ( cloud computing, quantum computing and collusion). CPK canadvance the authentication logic from \belief logic\ and \trustlogic\ to \truth logic\. The truth logic is the foundation ofconstructing authenticated (trus ted) connecting, computing,transaction, logistics, counter - forgery, and so on. Readersbenefited from this book will be researchers and professors,experts and students, engi neers and policy makers, and all otherswho are interested in cyber security.

作者簡介

暫缺《標(biāo)識鑒別:網(wǎng)際安全技術(shù)基礎(chǔ)》作者簡介

圖書目錄

Part One  Authentication Technology
  Chapter 1  Basic Concepts
Part Two  Cryptosystems
  Chapter 2  Authentication Logics
  Chapter 3  Identity Authentication
  Chapter 4  Combined Public Key (v6.0)
  Chapter 5  Cryptosystem and Authentication
  Chapter 6  Bytes Encryption
Part Three  CPK System
  Chapter 7  CPK Key Management
  Chapter 8  CPK-chip Design
  Chapter 9  CPK ID-card
Part Four  Code Authenticaiton
  Chapter 10  Software ID Authentication
  Chapter 11  Windows Code Authentication
  Chapter 12  Linux Code Authentication
Part Five  Communication Authentication
  Chapter 13  Phone Authentication
  Chapter 14  SSL Communication Authentication
  Chapter 15  Router Communication Authentication
Part Sixe-Commerce Authentication
  Chapter 16  e-Bank Authentication
  Chapter 17  e-Bill Authentication
Part Seven  Logistics Authentication
  Chapter 18  e-Tag Authentication
  Chapter 19  e-Wallet Authentication
Part Eight  Stored File Authentication
  Chapter 20  Storage Authentication
  Chapter 21  Secure File Box
  Chapter 22  Classification Seal Authentication
Part Nine  Moving Data Authentication
  Chapter 23  e-Mail Authentication
  Chapter 24  Digital Right Authentication
Part TenNetwork Authentication
  Chapter 25  Pass Authentication
  Chapter 26  Address Authentication
Appendices
References
Glossary
Technical Terms
Symbols

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號