标识鉴别
标识鉴别封面图

标识鉴别

南相浩, 著

出版社:电子工业出版社

年代:2011

定价:88.0

书籍简介:

本书讨论了未来“网际安全”的关键技术——基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。

书籍目录:

Part One Authentication Technology Chapter 1 Basic ConceptsPart Two Cryptosystems Chapter 2 Authentication Logics Chapter 3 Identity Authentication Chapter 4 Combined Public Key (v6.0) Chapter 5 Cryptosystem and Authentication Chapter 6 Bytes EncryptionPart Three CPK System Chapter 7 CPK Key Management Chapter 8 CPK-chip Design Chapter 9 CPK ID-cardPart Four Code Authenticaiton Chapter 10 Software ID Authentication Chapter 11 Windows Code Authentication Chapter 12 Linux Code AuthenticationPart Five Communication Authentication Chapter 13 Phone Authentication Chapter 14 SSL Communication Authentication Chapter 15 Router Communication AuthenticationPart Sixe-Commerce Authentication Chapter 16 e-Bank Authentication Chapter 17 e-Bill AuthenticationPart Seven Logistics Authentication Chapter 18 e-Tag Authentication Chapter 19 e-Wallet AuthenticationPart Eight Stored File Authentication Chapter 20 Storage Authentication Chapter 21 Secure File Box Chapter 22 Classification Seal AuthenticationPart Nine Moving Data Authentication Chapter 23 e-Mail Authentication Chapter 24 Digital Right AuthenticationPart TenNetwork Authentication Chapter 25 Pass Authentication Chapter 26 Address AuthenticationAppendicesReferencesGlossaryTechnical TermsSymbols

内容摘要:

The latest version of CPK (v6. 0) isrealized on chip. The CPK-chip carries CPK-cryptosystem to a newstage of development. The chip not only has the function ofsignature and verification, but also has the function of encryptionand decryption without any outside support. CPK can solve the hardproblem of scaled identity authentication, minimizing the threat ofattack ( cloud computing, quantum computing and collusion). CPK canadvance the authentication logic from "belief logic" and "trustlogic" to "truth logic". The truth logic is the foundation ofconstructing authenticated (trus ted) connecting, computing,transaction, logistics, counter - forgery, and so on. Readersbenefited from this book will be researchers and professors,experts and students, engi neers and policy makers, and all otherswho are interested in cyber security.

书籍规格:

书籍详细信息
书名标识鉴别站内查询相似图书
9787121134791
如需购买下载《标识鉴别》pdf扫描版电子书或查询更多相关信息,请直接复制isbn,搜索即可全网搜索该ISBN
出版地北京出版单位电子工业出版社
版次1版印次1
定价(元)88.0语种英文
尺寸24 × 17装帧精装
页数 280 印数

书籍信息归属:

标识鉴别是电子工业出版社于2011.6出版的中图分类号为 TP393.08 的主题关于 计算机网络-安全技术-英文 的书籍。