网站首页  软件下载  游戏下载  翻译软件  电子书下载  电影下载  电视剧下载  教程攻略

请输入您要查询的图书:

 

书名 标识鉴别--网际安全技术基础(精)
分类 教育考试-考试-计算机类
作者 南相浩
出版社 电子工业出版社
下载
简介
编辑推荐

南相浩编著的这本《标识鉴别——网际安全技术基础》讨论了未来“网际安全”的关键技术——基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。

内容推荐

The latest version of CPK (v6. 0) is realized on chip. The CPK-chip carries CPK-cryptosystem to a new stage of development. The chip not only has the function of signature and verification, but also has the function of encryption and decryption without any outside support. CPK can solve the hard problem of scaled identity authentication, minimizing the threat of attack ( cloud computing,quantum computing and collusion). CPK can advance the authentication logic from "belief logic" and "trust logic" to "truth logic". The truth logic is the foundation of constructing authenticated (trusted) connecting, computing, transaction, logistics, counter - forgery, and so on.

Readers benefited from this book will be researchers and professors, experts and students, engineers and policy makers, and all others who are interested in cyber security.

目录

Part One Authentication Technology

Chapter 1 Basic Concepts

Part Two Cryptosystems

Chapter 2 Authentication Logics

Chapter 3 Identity Authentication

Chapter 4 Combined Public Key (v6.0)

Chapter 5 Cryptosystem and Authentication

Chapter 6 Bytes Encryption

Part Three CPK System

Chapter 7 CPK Key Management

Chapter 8 CPK-chip Design

Chapter 9 CPK ID-card

Part Four Code Authenticaiton

Chapter 10 Software ID Authentication

Chapter 11 Windows Code Authentication

Chapter 12 Linux Code Authentication

Part Five Communication Authentication

Chapter 13 Phone Authentication

Chapter 14 SSL Communication Authentication

Chapter 15 Router Communication Authentication

Part Sixe-Commerce Authentication

Chapter 16 e-Bank Authentication

Chapter 17 e-Bill Authentication

Part Seven Logistics Authentication

Chapter 18 e-Tag Authentication

Chapter 19 e-Wallet Authentication

Part Eight Stored File Authentication

Chapter 20 Storage Authentication

Chapter 21 Secure File Box

Chapter 22 Classification Seal Authentication

Part Nine Moving Data Authentication

Chapter 23 e-Mail Authentication

Chapter 24 Digital Right Authentication

Part TenNetwork Authentication

Chapter 25 Pass Authentication

Chapter 26 Address Authentication

Appendices

References

Glossary

Technical Terms

Symbols

随便看

 

霍普软件下载网电子书栏目提供海量电子书在线免费阅读及下载。

 

Copyright © 2002-2024 101bt.net All Rights Reserved
更新时间:2025/5/13 8:28:57