• 网际安全技术构架:基于标识鉴别的可信系统(英文版)
图书条目标准图
21年品牌 40万+商家 超1.5亿件商品

网际安全技术构架:基于标识鉴别的可信系统(英文版)

14.63 1.7折 88 全新

库存3件

山东泰安
认证卖家担保交易快速发货售后保障

作者南相浩 著

出版社电子工业出版社

出版时间2010-09

版次1

装帧平装

货号R5库 10-21

上书时间2024-10-22

齐鲁淘宝书店

十四年老店
已实名 已认证 进店 收藏店铺

   商品详情   

品相描述:全新
图书标准信息
  • 作者 南相浩 著
  • 出版社 电子工业出版社
  • 出版时间 2010-09
  • 版次 1
  • ISBN 9787121113796
  • 定价 88.00元
  • 装帧 平装
  • 开本 16开
  • 纸张 胶版纸
  • 页数 248页
  • 字数 426千字
  • 正文语种 英语
【内容简介】
CPKCryptosystemchangesordinaryellipticcurvepublickeyintoanidentity-basedpublickeywithself-assuredproperty.Self-assuredpublickeycanadvancetheauthenticationlogicfromobject-authenticating"belieflogic"toentity-authenticating"trustlogic".Self-assuredpublickeysystemandtrustlogicofauthenticationcomposesthekeytechniqueofcybersecurity.Theconstructionoftrustconnecting,computing,transaction,logistics,counter-forgeryandnetworkmanagementwillbethemaincontentsofthenextgenerationofinformationsecurity.Readersbenefitedfromthisbookwillberesearchersandprofessors,expertsandstudents,developersandpolicymakers,andallotherwhoareinterestedincybersecurity.
【目录】
ContentsFOREWORD4CONTENTS7PARTONE18AUTHENTICATIONTECHNIQUE18CHAPTER119BASICCONCEPTS191.1PHYSICALWORLDANDDIGITALWORLD191.2AWORLDWITHORDERANDWITHOUTORDER201.3SELF-ASSUREDPROOFAND3RDPARTYPROOF221.4CERTIFICATIONCHAINANDTRUSTCHAIN241.5CENTRALIZEDANDDECENTRALIZEDMANAGEMENT251.6PHYSICALSIGNATUREANDDIGITALSIGNATURE27CHAPTER231AUTHENTICATIONLOGIC312.1BELIEFLOGIC312.2STANDARDPROTOCOL322.3TRUSTRELATIONSHIP332.3.1DirectTrust332.3.2AxiomaticTrust342.3.3InferenceTrust352.4TRUSTLOGIC362.4.1TherequirementofTrustLogic362.3.2TheProgressinPublicKey372.4.3EntityAuthenticity382.4.4TheCharacteristicsofTrustLogic392.5CPKPROTOCOL402.5.1One-wayProtocol402.5.2Two-wayProtocol41CHAPTER343IDENTITYAUTHENTICATION433.1COMMUNICATIONIDENTITYAUTHENTICATION443.2SOFTWAREIDENTITYAUTHENTICATION453.3ELECTRONICTAGAUTHENTICATION463.4NETWORKMANAGEMENT473.5HOLISTICSECURITY48PARTTWO51CRYPTO-SYSTEMS51CHAPTER452COMBINEDPUBLICKEY(CPK)524.1INTRODUCTION524.2ECCCOMPOUNDTHEOREM534.3IDENTITY-KEY534.3.1CombiningMatrix534.3.2MappingfromIdentitytoMatrixCoordinates544.3.3ComputationofIdentity-Key544.4.KEYCOMPOUNDING544.4.1TheCompoundingofIdentity-KeyandAccompanying-Key544.4.2TheCompoundingofIdentity-KeyandSeparating-key554.5CPKDIGITALSIGNATURE554.5.1SigningwithAccompanying-Key554.5.2SigningwithSeparating-key554.6CPKKEYEXCHANGE564.6.1KeyExchangewithSeparating-key564.6.2KeyExchangewithAccompanying-Key564.7CONCLUSION56CHAPTER558SELF-ASSUREDAND3RDPARTYPUBLICKEY585.1NEWREQUIREMENTSOFTHECRYPTO-SYSTEM585.2DEVELOPMENTOFCRYPTO-SYSTEMS595.3DIGITALSIGNATUREMECHANISM605.3.1IBCSignatureScheme605.3.2CPKSignaturewithSeparating-key615.3.3CPKSignaturewithAccompanying-Key615.3.4PKISignatureScheme615.3.5IB-RSASignatureScheme625.3.6mRSASignatureScheme635.3.7ComparisonofSchemes635.4KEYEXCHANGESCHEME645.4.1IBEKeyExchange645.4.2CPKKeyExchange645.4.3OtherKeyExchangeSchemes655.4.4PerformanceComparison655.5DISCUSSIONONTRUSTROOT66CHAPTER668BYTESENCRYPTION686.1TECHNICALBACKGROUND686.2CODINGSTRUCTURE706.2.1TranspositionTable(disk)706.2.2SubstitutionTable(subst)726.38-BITOPERATION746.3.1Assumptions746.3.2KeyDerivation756.3.3CombinationofDataandKeys756.3.4LeftShiftAccumulation766.3.5TranspositionConversion766.3.6SingleSubstitutionConversion776.3.7Re-combinationofDataandKeys776.3.8RightShiftAccumulation786.3.9Re-transposition786.47-BITOPERATION796.4.1GivenConditions796.4.2KeyDerivation796.4.3CombinationofDataandKey806.4.4LeftShiftAccumulation816.4.5TranspositionConversion816.4.6SingleSubstitutionConversion826.4.7Re-combinationofDataandKey826.4.8RightShiftAccumulation836.4.9Re-composition836.5SAFETYEVALUATION846.5.1KeyGranularity846.5.2ConfusionandDiffusion856.5.3Multiple-levelProductConversion85PARTTHREE86CPKSYSTEM86CHAPTER787CPKKEYMANAGEMENT877.1CPKKEYDISTRIBUTION877.1.1AuthenticationNetwork877.1.2CommunicationKey887.1.3ClassificationofKeys887.2CPKSIGNATURE897.2.1DigitalSignatureandVerification897.2.2SignatureFormat907.3CPKKEYEXCHANGE907.4CPKDATAENCRYPTION917.5KEYPROTECTION927.5.1PasswordVerification927.5.2PasswordChange93CHAPTER894CPK-CHIPDESIGN948.1BACKGROUND948.2MAINTECHNOLOGY948.3CHIPSTRUCTURE968.4MAINFUNCTIONS1008.4.1DigitalSignature1008.4.2DataEncryption101CHAPTER9104CPKID-CARD1049.1BACKGROUND1049.2ID-CARDSTRUCTURE1069.2.1ThePartofMainBody1069.2.2ThePartofVariables1069.3ID-CARDDATAFORMAT1079.4ID-CARDMANAGEMENT1109.4.1AdministrativeOrganization1109.4.2ApplicationforID-Card1119.4.3RegistrationDepartment1129.4.4ProductionDepartment1139.4.5IssuingDepartment115PARTFOUR116TRUSTCOMPUTING116CHAPTER10117SOFTWAREIDAUTHENTICATION11710.1TECHNICALBACKGROUND11710.2MAINTECHNOLOGY11810.3SIGNINGMODULE11910.4VERIFYINGMODULE12110.5THEFEATUREOFCODESIGNING123CHAPTER11125CODESIGNINGOFWINDOWS12511.1INTRODUCTION12511.2PEFILE12511.3MINI-FILTER12611.3.1NTI/OSubsystem12611.3.2FileFilterDriving12711.3.3Minifilter12811.4CODEAUTHENTICATIONOFWINDOWS12911.4.1TheSystemFramework12911.4.2CharacteristicsCollecting12911.5CONCLUSION130CHAPTER12131CODESIIGNINGOFLINUX…………………………………13112.1GENERALDESCRIPTION13112.2ELFFILE13112.3LINUXSECURITYMODULE(LSM)FRAMEWORK13212.4IMPLEMENTATION133PARTFIVE135TRUSTCONNECTING135CHAPTER13136PHONETRUSTCONNECTING13613.1MAINTECHNOLOGIES13613.2CONNECTINGPROCEDURE13713.3DATAENCRYPTION13813.4DATADECRYPTION139CHAPTER14140SOCKETLAYERTRUSTCONNECTING14014.1LAYERSOFCOMMUNICATION14014.2SECURESOCKETLAYER(SSL)14114.3TRUSTEDSOCKETLAYER(TSL)14414.4TSLWORKINGPRINCIPLE14514.5TSLADDRESSAUTHENTICATION14714.6COMPARISON148CHAPTER15150ROUTERTRUSTCONNECTING15015.1PRINCIPLEOFROUTER15115.2REQUIREMENTSOFTRUSTEDCONNECTION15215.3FUNDAMENTALTECHNOLOGY15415.4ORIGINADDRESSAUTHENTICATION15415.5ENCRYPTIONFUNCTION15715.5.1EncryptionProcess15815.5.2DecryptionProcess15815.6REQUIREMENTOFHEADERFORMAT15815.7TRUSTEDCOMPUTINGENVIRONMENT15915.7.1EvidenceofSoftwareCode15915.7.2AuthenticationofSoftwareCode159PARTSIX161TRUSTE-COMMERCE161CHAPTER16162E-BANKAUTHENTICATION16216.1BACKGROUND16216.2COUNTERBUSINESS16316.3BUSINESSLAYER16416.4BASICTECHNOLOGY16616.5BUSINESSATATM16716.6COMMUNICATIONBETWEENATMANDPORTAL16716.7THEADVANTAGES169CHAPTER17171E-BILLAUTHENTICATION17117.1BILLAUTHENTICATIONNETWORK17117.2MAINTECHNOLOGIES17217.3APPLICATIONFORBILLS17317.4CIRCULATIONOFBILLS17417.5VERIFICATIONOFCHECK174PARTSEVEN176TRUSTLOGISTICS176CHAPTER18177E-TAGAUTHENTICATION17718.1BACKGROUND17718.2MAINTECHNOLOGY17818.3EMBODIMENT(Ⅰ)18018.4EMBODIMENT(Ⅱ)181CHAPTER19183THEDESIGNOFMYWALLET18319.1TWOKINDSOFAUTHENTICATIONCONCEPT18319.2SYSTEMCONFIGURATION18519.3TAGSTRUCTURE18619.3.1StructureofDataRegion18619.3.2StructureofControlRegion18619.4TAGDATAGENERATIONANDAUTHENTICATION18719.4.1KMC18719.4.2Enterprise18719.4.3WriterandReader18819.5PROTOCOLDESIGN18819.6CONCLUSION190PARTEIGHT191FILE&NETWORKMANAGEMENT191CHAPTER20192E-MAILAUTHENTICATION19220.1MAINTECHNOLOGIES19220.2SENDINGPROCESS19320.3RECEIVINGPROCESS194CHAPTER21196DATASTORAGEAUTHENTICATION19621.1SECURITYREQUIREMENTS19621.2BASICTECHNOLOGY19721.3FILEUPLOADINGPROTOCOL19821.4FILEDOWNLOADINGPROTOCOL19921.5DATASTORING20021.5.1EstablishmentofKeyFile20121.5.2StorageofKeyFile20121.5.3DocumentalDatabaseEncryption20221.5.4RelationalDatabaseEncryption202CHAPTER22205SECUREFILEBOX20522.1BACKGROUND20522.2SYSTEMFRAMEWORK20622.3FEATURESOFTHESYSTEM20722.4SYSTEMIMPLEMENTATION208CHAPTER23211E-SEALOFCLASSIFICATION21123.1BACKGROUNDTECHNOLOGY21123.2MAINTECHNOLOGIES21223.3WORKINGFLOW21423.4EMBODIMENT21523.5EXPLANATION216CHAPTER24223WATER-WALLFORINTRANET22324.1BACKGROUND22324.2WORKINGPRINCIPLES22424.3THEDIAGRAMOFINTRANETWATER-WALL22524.4WATER-WALLFORINDIVIDUALPC22824.5GUARDINGPOLICY229CHAPTER25230DIGITALRIGHTAUTHENTICATION23025.1TECHNICALBACKGROUND23025.2MAINTECHNOLOGIES23125.3MANUFACTURER’SDIGITALRIGHT23225.4ENTERPRISE’SRIGHTOFOPERATION23325.5CLIENT’SRIGHTOFUSAGE234REFERENCES242APPENDICES244APPENDIXA245WALKOUTOFMYSTERIOUS“BLACKCHAMBER”245APPENDIXB251IDENTITYAUTHENTICATIONOPENINGANEWLANDFORINFORMATIONSECURITY251APPENDIXC259SEARCHINGFORSAFE“SILVERBULLET”259APPENDIXD269“ELECTRONICIDCARD”ATTRACTSINTERNATIONALATTENTION269APPENDIXE274CPKSYSTEMGOESTOTHEWORLD274APPENDIXF278IDENTITYAUTHENTICATIONBASEDONCPKSYSTEM278
点击展开 点击收起

   相关推荐   

—  没有更多了  —

以下为对购买帮助不大的评价

此功能需要访问孔网APP才能使用
暂时不用
打开孔网APP