网际安全技术构架:基于标识鉴别的可信系统(英文版)
正版图书
¥
27.72
3.2折
¥
88
全新
库存26件
作者南相浩 著
出版社电子工业出版社
出版时间2010-09
版次1
装帧平装
货号Y-64
上书时间2024-11-21
商品详情
- 品相描述:全新
图书标准信息
-
作者
南相浩 著
-
出版社
电子工业出版社
-
出版时间
2010-09
-
版次
1
-
ISBN
9787121113796
-
定价
88.00元
-
装帧
平装
-
开本
16开
-
纸张
胶版纸
-
页数
248页
-
字数
426千字
-
正文语种
英语
- 【内容简介】
-
CPKCryptosystemchangesordinaryellipticcurvepublickeyintoanidentity-basedpublickeywithself-assuredproperty.Self-assuredpublickeycanadvancetheauthenticationlogicfromobject-authenticating"belieflogic"toentity-authenticating"trustlogic".Self-assuredpublickeysystemandtrustlogicofauthenticationcomposesthekeytechniqueofcybersecurity.Theconstructionoftrustconnecting,computing,transaction,logistics,counter-forgeryandnetworkmanagementwillbethemaincontentsofthenextgenerationofinformationsecurity.Readersbenefitedfromthisbookwillberesearchersandprofessors,expertsandstudents,developersandpolicymakers,andallotherwhoareinterestedincybersecurity.
- 【目录】
-
ContentsFOREWORD4CONTENTS7PARTONE18AUTHENTICATIONTECHNIQUE18CHAPTER119BASICCONCEPTS191.1PHYSICALWORLDANDDIGITALWORLD191.2AWORLDWITHORDERANDWITHOUTORDER201.3SELF-ASSUREDPROOFAND3RDPARTYPROOF221.4CERTIFICATIONCHAINANDTRUSTCHAIN241.5CENTRALIZEDANDDECENTRALIZEDMANAGEMENT251.6PHYSICALSIGNATUREANDDIGITALSIGNATURE27CHAPTER231AUTHENTICATIONLOGIC312.1BELIEFLOGIC312.2STANDARDPROTOCOL322.3TRUSTRELATIONSHIP332.3.1DirectTrust332.3.2AxiomaticTrust342.3.3InferenceTrust352.4TRUSTLOGIC362.4.1TherequirementofTrustLogic362.3.2TheProgressinPublicKey372.4.3EntityAuthenticity382.4.4TheCharacteristicsofTrustLogic392.5CPKPROTOCOL402.5.1One-wayProtocol402.5.2Two-wayProtocol41CHAPTER343IDENTITYAUTHENTICATION433.1COMMUNICATIONIDENTITYAUTHENTICATION443.2SOFTWAREIDENTITYAUTHENTICATION453.3ELECTRONICTAGAUTHENTICATION463.4NETWORKMANAGEMENT473.5HOLISTICSECURITY48PARTTWO51CRYPTO-SYSTEMS51CHAPTER452COMBINEDPUBLICKEY(CPK)524.1INTRODUCTION524.2ECCCOMPOUNDTHEOREM534.3IDENTITY-KEY534.3.1CombiningMatrix534.3.2MappingfromIdentitytoMatrixCoordinates544.3.3ComputationofIdentity-Key544.4.KEYCOMPOUNDING544.4.1TheCompoundingofIdentity-KeyandAccompanying-Key544.4.2TheCompoundingofIdentity-KeyandSeparating-key554.5CPKDIGITALSIGNATURE554.5.1SigningwithAccompanying-Key554.5.2SigningwithSeparating-key554.6CPKKEYEXCHANGE564.6.1KeyExchangewithSeparating-key564.6.2KeyExchangewithAccompanying-Key564.7CONCLUSION56CHAPTER558SELF-ASSUREDAND3RDPARTYPUBLICKEY585.1NEWREQUIREMENTSOFTHECRYPTO-SYSTEM585.2DEVELOPMENTOFCRYPTO-SYSTEMS595.3DIGITALSIGNATUREMECHANISM605.3.1IBCSignatureScheme605.3.2CPKSignaturewithSeparating-key615.3.3CPKSignaturewithAccompanying-Key615.3.4PKISignatureScheme615.3.5IB-RSASignatureScheme625.3.6mRSASignatureScheme635.3.7ComparisonofSchemes635.4KEYEXCHANGESCHEME645.4.1IBEKeyExchange645.4.2CPKKeyExchange645.4.3OtherKeyExchangeSchemes655.4.4PerformanceComparison655.5DISCUSSIONONTRUSTROOT66CHAPTER668BYTESENCRYPTION686.1TECHNICALBACKGROUND686.2CODINGSTRUCTURE706.2.1TranspositionTable(disk)706.2.2SubstitutionTable(subst)726.38-BITOPERATION746.3.1Assumptions746.3.2KeyDerivation756.3.3CombinationofDataandKeys756.3.4LeftShiftAccumulation766.3.5TranspositionConversion766.3.6SingleSubstitutionConversion776.3.7Re-combinationofDataandKeys776.3.8RightShiftAccumulation786.3.9Re-transposition786.47-BITOPERATION796.4.1GivenConditions796.4.2KeyDerivation796.4.3CombinationofDataandKey806.4.4LeftShiftAccumulation816.4.5TranspositionConversion816.4.6SingleSubstitutionConversion826.4.7Re-combinationofDataandKey826.4.8RightShiftAccumulation836.4.9Re-composition836.5SAFETYEVALUATION846.5.1KeyGranularity846.5.2ConfusionandDiffusion856.5.3Multiple-levelProductConversion85PARTTHREE86CPKSYSTEM86CHAPTER787CPKKEYMANAGEMENT877.1CPKKEYDISTRIBUTION877.1.1AuthenticationNetwork877.1.2CommunicationKey887.1.3ClassificationofKeys887.2CPKSIGNATURE897.2.1DigitalSignatureandVerification897.2.2SignatureFormat907.3CPKKEYEXCHANGE907.4CPKDATAENCRYPTION917.5KEYPROTECTION927.5.1PasswordVerification927.5.2PasswordChange93CHAPTER894CPK-CHIPDESIGN948.1BACKGROUND948.2MAINTECHNOLOGY948.3CHIPSTRUCTURE968.4MAINFUNCTIONS1008.4.1DigitalSignature1008.4.2DataEncryption101CHAPTER9104CPKID-CARD1049.1BACKGROUND1049.2ID-CARDSTRUCTURE1069.2.1ThePartofMainBody1069.2.2ThePartofVariables1069.3ID-CARDDATAFORMAT1079.4ID-CARDMANAGEMENT1109.4.1AdministrativeOrganization1109.4.2ApplicationforID-Card1119.4.3RegistrationDepartment1129.4.4ProductionDepartment1139.4.5IssuingDepartment115PARTFOUR116TRUSTCOMPUTING116CHAPTER10117SOFTWAREIDAUTHENTICATION11710.1TECHNICALBACKGROUND11710.2MAINTECHNOLOGY11810.3SIGNINGMODULE11910.4VERIFYINGMODULE12110.5THEFEATUREOFCODESIGNING123CHAPTER11125CODESIGNINGOFWINDOWS12511.1INTRODUCTION12511.2PEFILE12511.3MINI-FILTER12611.3.1NTI/OSubsystem12611.3.2FileFilterDriving12711.3.3Minifilter12811.4CODEAUTHENTICATIONOFWINDOWS12911.4.1TheSystemFramework12911.4.2CharacteristicsCollecting12911.5CONCLUSION130CHAPTER12131CODESIIGNINGOFLINUX…………………………………13112.1GENERALDESCRIPTION13112.2ELFFILE13112.3LINUXSECURITYMODULE(LSM)FRAMEWORK13212.4IMPLEMENTATION133PARTFIVE135TRUSTCONNECTING135CHAPTER13136PHONETRUSTCONNECTING13613.1MAINTECHNOLOGIES13613.2CONNECTINGPROCEDURE13713.3DATAENCRYPTION13813.4DATADECRYPTION139CHAPTER14140SOCKETLAYERTRUSTCONNECTING14014.1LAYERSOFCOMMUNICATION14014.2SECURESOCKETLAYER(SSL)14114.3TRUSTEDSOCKETLAYER(TSL)14414.4TSLWORKINGPRINCIPLE14514.5TSLADDRESSAUTHENTICATION14714.6COMPARISON148CHAPTER15150ROUTERTRUSTCONNECTING15015.1PRINCIPLEOFROUTER15115.2REQUIREMENTSOFTRUSTEDCONNECTION15215.3FUNDAMENTALTECHNOLOGY15415.4ORIGINADDRESSAUTHENTICATION15415.5ENCRYPTIONFUNCTION15715.5.1EncryptionProcess15815.5.2DecryptionProcess15815.6REQUIREMENTOFHEADERFORMAT15815.7TRUSTEDCOMPUTINGENVIRONMENT15915.7.1EvidenceofSoftwareCode15915.7.2AuthenticationofSoftwareCode159PARTSIX161TRUSTE-COMMERCE161CHAPTER16162E-BANKAUTHENTICATION16216.1BACKGROUND16216.2COUNTERBUSINESS16316.3BUSINESSLAYER16416.4BASICTECHNOLOGY16616.5BUSINESSATATM16716.6COMMUNICATIONBETWEENATMANDPORTAL16716.7THEADVANTAGES169CHAPTER17171E-BILLAUTHENTICATION17117.1BILLAUTHENTICATIONNETWORK17117.2MAINTECHNOLOGIES17217.3APPLICATIONFORBILLS17317.4CIRCULATIONOFBILLS17417.5VERIFICATIONOFCHECK174PARTSEVEN176TRUSTLOGISTICS176CHAPTER18177E-TAGAUTHENTICATION17718.1BACKGROUND17718.2MAINTECHNOLOGY17818.3EMBODIMENT(Ⅰ)18018.4EMBODIMENT(Ⅱ)181CHAPTER19183THEDESIGNOFMYWALLET18319.1TWOKINDSOFAUTHENTICATIONCONCEPT18319.2SYSTEMCONFIGURATION18519.3TAGSTRUCTURE18619.3.1StructureofDataRegion18619.3.2StructureofControlRegion18619.4TAGDATAGENERATIONANDAUTHENTICATION18719.4.1KMC18719.4.2Enterprise18719.4.3WriterandReader18819.5PROTOCOLDESIGN18819.6CONCLUSION190PARTEIGHT191FILE&NETWORKMANAGEMENT191CHAPTER20192E-MAILAUTHENTICATION19220.1MAINTECHNOLOGIES19220.2SENDINGPROCESS19320.3RECEIVINGPROCESS194CHAPTER21196DATASTORAGEAUTHENTICATION19621.1SECURITYREQUIREMENTS19621.2BASICTECHNOLOGY19721.3FILEUPLOADINGPROTOCOL19821.4FILEDOWNLOADINGPROTOCOL19921.5DATASTORING20021.5.1EstablishmentofKeyFile20121.5.2StorageofKeyFile20121.5.3DocumentalDatabaseEncryption20221.5.4RelationalDatabaseEncryption202CHAPTER22205SECUREFILEBOX20522.1BACKGROUND20522.2SYSTEMFRAMEWORK20622.3FEATURESOFTHESYSTEM20722.4SYSTEMIMPLEMENTATION208CHAPTER23211E-SEALOFCLASSIFICATION21123.1BACKGROUNDTECHNOLOGY21123.2MAINTECHNOLOGIES21223.3WORKINGFLOW21423.4EMBODIMENT21523.5EXPLANATION216CHAPTER24223WATER-WALLFORINTRANET22324.1BACKGROUND22324.2WORKINGPRINCIPLES22424.3THEDIAGRAMOFINTRANETWATER-WALL22524.4WATER-WALLFORINDIVIDUALPC22824.5GUARDINGPOLICY229CHAPTER25230DIGITALRIGHTAUTHENTICATION23025.1TECHNICALBACKGROUND23025.2MAINTECHNOLOGIES23125.3MANUFACTURER’SDIGITALRIGHT23225.4ENTERPRISE’SRIGHTOFOPERATION23325.5CLIENT’SRIGHTOFUSAGE234REFERENCES242APPENDICES244APPENDIXA245WALKOUTOFMYSTERIOUS“BLACKCHAMBER”245APPENDIXB251IDENTITYAUTHENTICATIONOPENINGANEWLANDFORINFORMATIONSECURITY251APPENDIXC259SEARCHINGFORSAFE“SILVERBULLET”259APPENDIXD269“ELECTRONICIDCARD”ATTRACTSINTERNATIONALATTENTION269APPENDIXE274CPKSYSTEMGOESTOTHEWORLD274APPENDIXF278IDENTITYAUTHENTICATIONBASEDONCPKSYSTEM278
点击展开
点击收起
— 没有更多了 —
以下为对购买帮助不大的评价