The latest version of CPK (v6. 0) isrealized on chip. The CPK-chip carries CPK-cryptosystem to a newstage of development. The chip not only has the function ofsignature and verification, but also has the function of encryptionand decryption without any outside support. CPK can solve the hardproblem of scaled identity authentication, minimizing the threat ofattack ( cloud computing, quantum computing and collusion). CPK canadvance the authentication logic from \belief logic\ and \trustlogic\ to \truth logic\. The truth logic is the foundation ofconstructing authenticated (trus ted) connecting, computing,transaction, logistics, counter - forgery, and so on. Readersbenefited from this book will be researchers and professors,experts and students, engi neers and policy makers, and all otherswho are interested in cyber security.
作者簡介
暫缺《標(biāo)識鑒別:網(wǎng)際安全技術(shù)基礎(chǔ)》作者簡介
圖書目錄
Part One Authentication Technology Chapter 1 Basic Concepts Part Two Cryptosystems Chapter 2 Authentication Logics Chapter 3 Identity Authentication Chapter 4 Combined Public Key (v6.0) Chapter 5 Cryptosystem and Authentication Chapter 6 Bytes Encryption Part Three CPK System Chapter 7 CPK Key Management Chapter 8 CPK-chip Design Chapter 9 CPK ID-card Part Four Code Authenticaiton Chapter 10 Software ID Authentication Chapter 11 Windows Code Authentication Chapter 12 Linux Code Authentication Part Five Communication Authentication Chapter 13 Phone Authentication Chapter 14 SSL Communication Authentication Chapter 15 Router Communication Authentication Part Sixe-Commerce Authentication Chapter 16 e-Bank Authentication Chapter 17 e-Bill Authentication Part Seven Logistics Authentication Chapter 18 e-Tag Authentication Chapter 19 e-Wallet Authentication Part Eight Stored File Authentication Chapter 20 Storage Authentication Chapter 21 Secure File Box Chapter 22 Classification Seal Authentication Part Nine Moving Data Authentication Chapter 23 e-Mail Authentication Chapter 24 Digital Right Authentication Part TenNetwork Authentication Chapter 25 Pass Authentication Chapter 26 Address Authentication Appendices References Glossary Technical Terms Symbols