网站首页  软件下载  游戏下载  翻译软件  电子书下载  电影下载  电视剧下载  教程攻略

请输入您要查询的图书:

 

书名 网际安全技术构架--基于标识鉴别的可信系统
分类 教育考试-考试-计算机类
作者 南相浩
出版社 电子工业出版社
下载
简介
编辑推荐

本书讨论了未来“网际安全”的关键技术——基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。

内容推荐

CPK Cryptosystem changes ordinary elliptic curve public key into an identity-based public key with self-assured property. Self-assured public key can advance the authentication logic from object-authenticating "belief logic" to entity-authenticating "trust logic". Self-assured public key system and trust logic of authentication composes the key technique of cyber security. The construction of trust connecting,computing,transaction,logistics,counter-forgery and network management will be the main contents of the next generation of information security.

Readers benefited from this book will be researchers and professors, experts and students, developers and policy makers, and all other who are interested in cyber security.

目录

Part One Authentication Technique

Chapter 1 Basic Concepts

Chapter 2 Authentication Logic

Chapter 3 Identity Authentication

Part Two Crypto- systems

Chapter 4 Combined Public Key (CPK)

Chapter 5 Self-assured and 3rd Party Public Key

Ghapter 6 Bytes Encryption

Part Three CPK System

Chapter 7 CPK Key Management

Chapter 8 CPK-chip Design

Chapter 9 CPK ID-card

Part Four Trust Computing

Chapter 10 SoftwarelD Authentication

Chapter 11 Code Signing of Windows

Chapter 12 Code Signing of Linux

Part Five Trust Connecting

Chapter 13 Phone Trust Connecting

Chapter 14 Socket Layer Trust Connecting

Chapter 15 Router Trust Connecting

Part Six Trust e-Commerce

Chapter 17 e-Bill Authentication

Part Seven Trust Logistics

Chapter 18 e-Tag Authentication

Chapter 19 The Design of Mywallet

Part Eight File & Network Management

Chapter 20 e-Mail Authentication

Chapter 21 Data Storage Authentication

Chapter 22 Secure File Box

Chapter 23 e-Seal of Classification

Chapter 24 Water-wall for Intranet

Chapter 25 Digital Right Authentication

Postscript New Trend of Information Security

Appendices

Appendix A

Walk Out of Mysterious "Black Chamber"

Appendix B

Identity Authentication Opening a New Land for Information Security

Appendix C

Searching for Safe "Silver Bullet"

Appendix D

"Electronic-ID Card" Attracts International Attention

Appendix E

CPK System Goes to the World

Appendix F

Identity Authentication Based on CPK System

Appendix G

CPK Cpyptosystem

References

随便看

 

霍普软件下载网电子书栏目提供海量电子书在线免费阅读及下载。

 

Copyright © 2002-2024 101bt.net All Rights Reserved
更新时间:2025/3/1 11:11:09