本书讨论了未来“网际安全”的关键技术——基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。
网站首页 软件下载 游戏下载 翻译软件 电子书下载 电影下载 电视剧下载 教程攻略
书名 | 网际安全技术构架--基于标识鉴别的可信系统 |
分类 | 教育考试-考试-计算机类 |
作者 | 南相浩 |
出版社 | 电子工业出版社 |
下载 | ![]() |
简介 | 编辑推荐 本书讨论了未来“网际安全”的关键技术——基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。 内容推荐 CPK Cryptosystem changes ordinary elliptic curve public key into an identity-based public key with self-assured property. Self-assured public key can advance the authentication logic from object-authenticating "belief logic" to entity-authenticating "trust logic". Self-assured public key system and trust logic of authentication composes the key technique of cyber security. The construction of trust connecting,computing,transaction,logistics,counter-forgery and network management will be the main contents of the next generation of information security. Readers benefited from this book will be researchers and professors, experts and students, developers and policy makers, and all other who are interested in cyber security. 目录 Part One Authentication Technique Chapter 1 Basic Concepts Chapter 2 Authentication Logic Chapter 3 Identity Authentication Part Two Crypto- systems Chapter 4 Combined Public Key (CPK) Chapter 5 Self-assured and 3rd Party Public Key Ghapter 6 Bytes Encryption Part Three CPK System Chapter 7 CPK Key Management Chapter 8 CPK-chip Design Chapter 9 CPK ID-card Part Four Trust Computing Chapter 10 SoftwarelD Authentication Chapter 11 Code Signing of Windows Chapter 12 Code Signing of Linux Part Five Trust Connecting Chapter 13 Phone Trust Connecting Chapter 14 Socket Layer Trust Connecting Chapter 15 Router Trust Connecting Part Six Trust e-Commerce Chapter 17 e-Bill Authentication Part Seven Trust Logistics Chapter 18 e-Tag Authentication Chapter 19 The Design of Mywallet Part Eight File & Network Management Chapter 20 e-Mail Authentication Chapter 21 Data Storage Authentication Chapter 22 Secure File Box Chapter 23 e-Seal of Classification Chapter 24 Water-wall for Intranet Chapter 25 Digital Right Authentication Postscript New Trend of Information Security Appendices Appendix A Walk Out of Mysterious "Black Chamber" Appendix B Identity Authentication Opening a New Land for Information Security Appendix C Searching for Safe "Silver Bullet" Appendix D "Electronic-ID Card" Attracts International Attention Appendix E CPK System Goes to the World Appendix F Identity Authentication Based on CPK System Appendix G CPK Cpyptosystem References |
随便看 |
|
霍普软件下载网电子书栏目提供海量电子书在线免费阅读及下载。