成功加入购物车
南相浩 著 / 电子工业出版社 / 2010-09 / 平装
售价 ¥ 10.00 1.1折
定价 ¥88.00
品相 九品
优惠 满包邮
延迟发货说明
上书时间2022-11-13
卖家超过10天未登录
网际安全技术构架:基于标识鉴别的可信系统(英文版)
CPKCryptosystemchangesordinaryellipticcurvepublickeyintoanidentity-basedpublickeywithself-assuredproperty.Self-assuredpublickeycanadvancetheauthenticationlogicfromobject-authenticating"belieflogic"toentity-authenticating"trustlogic".Self-assuredpublickeysystemandtrustlogicofauthenticationcomposesthekeytechniqueofcybersecurity.Theconstructionoftrustconnecting,computing,transaction,logistics,counter-forgeryandnetworkmanagementwillbethemaincontentsofthenextgenerationofinformationsecurity.Readersbenefitedfromthisbookwillberesearchersandprofessors,expertsandstudents,developersandpolicymakers,andallotherwhoareinterestedincybersecurity.
ContentsFOREWORD 4CONTENTS 7PARTONE 18AUTHENTICATIONTECHNIQUE 18CHAPTER1 19BASICCONCEPTS 191.1PHYSICALWORLDANDDIGITALWORLD 191.2AWORLDWITHORDERANDWITHOUTORDER 201.3SELF-ASSUREDPROOFAND3RDPARTYPROOF 221.4CERTIFICATIONCHAINANDTRUSTCHAIN 241.5CENTRALIZEDANDDECENTRALIZEDMANAGEMENT 251.6PHYSICALSIGNATUREANDDIGITALSIGNATURE 27CHAPTER2 31AUTHENTICATIONLOGIC 312.1BELIEFLOGIC 312.2STANDARDPROTOCOL 322.3TRUSTRELATIONSHIP 332.3.1DirectTrust 332.3.2AxiomaticTrust 342.3.3InferenceTrust 352.4TRUSTLOGIC 362.4.1TherequirementofTrustLogic 362.3.2TheProgressinPublicKey 372.4.3EntityAuthenticity 382.4.4TheCharacteristicsofTrustLogic 392.5CPKPROTOCOL 402.5.1One-wayProtocol 402.5.2Two-wayProtocol 41CHAPTER3 43IDENTITYAUTHENTICATION 433.1COMMUNICATIONIDENTITYAUTHENTICATION 443.2SOFTWAREIDENTITYAUTHENTICATION 453.3ELECTRONICTAGAUTHENTICATION 463.4NETWORKMANAGEMENT 473.5HOLISTICSECURITY 48PARTTWO 51CRYPTO-SYSTEMS 51CHAPTER4 52COMBINEDPUBLICKEY(CPK) 524.1INTRODUCTION 524.2ECCCOMPOUNDTHEOREM 534.3IDENTITY-KEY 534.3.1CombiningMatrix 534.3.2MappingfromIdentitytoMatrixCoordinates 544.3.3ComputationofIdentity-Key 544.4.KEYCOMPOUNDING 544.4.1TheCompoundingofIdentity-KeyandAccompanying-Key 544.4.2TheCompoundingofIdentity-KeyandSeparating-key 554.5CPKDIGITALSIGNATURE 554.5.1SigningwithAccompanying-Key 554.5.2SigningwithSeparating-key 554.6CPKKEYEXCHANGE 564.6.1KeyExchangewithSeparating-key 564.6.2KeyExchangewithAccompanying-Key 564.7CONCLUSION 56CHAPTER5 58SELF-ASSUREDAND3RDPARTYPUBLICKEY 585.1NEWREQUIREMENTSOFTHECRYPTO-SYSTEM 585.2DEVELOPMENTOFCRYPTO-SYSTEMS 595.3DIGITALSIGNATUREMECHANISM 605.3.1IBCSignatureScheme 605.3.2CPKSignaturewithSeparating-key 615.3.3CPKSignaturewithAccompanying-Key 615.3.4PKISignatureScheme 615.3.5IB-RSASignatureScheme 625.3.6mRSASignatureScheme 635.3.7ComparisonofSchemes 635.4KEYEXCHANGESCHEME 645.4.1IBEKeyExchange 645.4.2CPKKeyExchange 645.4.3OtherKeyExchangeSchemes 655.4.4PerformanceComparison 655.5DISCUSSIONONTRUSTROOT 66CHAPTER6 68BYTESENCRYPTION 686.1TECHNICALBACKGROUND 686.2CODINGSTRUCTURE 706.2.1TranspositionTable(disk) 706.2.2SubstitutionTable(subst) 726.38-BITOPERATION 746.3.1Assumptions 746.3.2KeyDerivation 756.3.3CombinationofDataandKeys 756.3.4LeftShiftAccumulation 766.3.5TranspositionConversion 766.3.6SingleSubstitutionConversion 776.3.7Re-combinationofDataandKeys 776.3.8RightShiftAccumulation 786.3.9Re-transposition 786.47-BITOPERATION 796.4.1GivenConditions 796.4.2KeyDerivation 796.4.3CombinationofDataandKey 806.4.4LeftShiftAccumulation 816.4.5TranspositionConversion 816.4.6SingleSubstitutionConversion 826.4.7Re-combinationofDataandKey 826.4.8RightShiftAccumulation 836.4.9Re-composition 836.5SAFETYEVALUATION 846.5.1KeyGranularity 846.5.2ConfusionandDiffusion 856.5.3Multiple-levelProductConversion 85PARTTHREE 86CPKSYSTEM 86CHAPTER7 87CPKKEYMANAGEMENT 877.1CPKKEYDISTRIBUTION 877.1.1AuthenticationNetwork 877.1.2CommunicationKey 887.1.3ClassificationofKeys 887.2CPKSIGNATURE 897.2.1DigitalSignatureandVerification 897.2.2SignatureFormat 907.3CPKKEYEXCHANGE 907.4CPKDATAENCRYPTION 917.5KEYPROTECTION 927.5.1PasswordVerification 927.5.2PasswordChange 93CHAPTER8 94CPK-CHIPDESIGN 948.1BACKGROUND 948.2MAINTECHNOLOGY 948.3CHIPSTRUCTURE 968.4MAINFUNCTIONS 1008.4.1DigitalSignature 1008.4.2DataEncryption 101CHAPTER9 104CPKID-CARD 1049.1BACKGROUND 1049.2ID-CARDSTRUCTURE 1069.2.1ThePartofMainBody 1069.2.2ThePartofVariables 1069.3ID-CARDDATAFORMAT 1079.4ID-CARDMANAGEMENT 1109.4.1AdministrativeOrganization 1109.4.2ApplicationforID-Card 1119.4.3RegistrationDepartment 1129.4.4ProductionDepartment 1139.4.5IssuingDepartment 115PARTFOUR 116TRUSTCOMPUTING 116CHAPTER10 117SOFTWAREIDAUTHENTICATION 11710.1TECHNICALBACKGROUND 11710.2MAINTECHNOLOGY 11810.3SIGNINGMODULE 11910.4VERIFYINGMODULE 12110.5THEFEATUREOFCODESIGNING 123CHAPTER11 125CODESIGNINGOFWINDOWS 12511.1INTRODUCTION 12511.2PEFILE 12511.3MINI-FILTER 12611.3.1NTI/OSubsystem 12611.3.2FileFilterDriving 12711.3.3Minifilter 12811.4CODEAUTHENTICATIONOFWINDOWS 12911.4.1TheSystemFramework 12911.4.2CharacteristicsCollecting 12911.5CONCLUSION 130CHAPTER12 131CODESIIGNINGOFLINUX…………………………………13112.1GENERALDESCRIPTION 13112.2ELFFILE 13112.3LINUXSECURITYMODULE(LSM)FRAMEWORK 13212.4IMPLEMENTATION 133PARTFIVE 135TRUSTCONNECTING 135CHAPTER13 136PHONETRUSTCONNECTING 13613.1MAINTECHNOLOGIES 13613.2CONNECTINGPROCEDURE 13713.3DATAENCRYPTION 13813.4DATADECRYPTION 139CHAPTER14 140SOCKETLAYERTRUSTCONNECTING 14014.1LAYERSOFCOMMUNICATION 14014.2SECURESOCKETLAYER(SSL) 14114.3TRUSTEDSOCKETLAYER(TSL) 14414.4TSLWORKINGPRINCIPLE 14514.5TSLADDRESSAUTHENTICATION 14714.6COMPARISON 148CHAPTER15 150ROUTERTRUSTCONNECTING 15015.1PRINCIPLEOFROUTER 15115.2REQUIREMENTSOFTRUSTEDCONNECTION 15215.3FUNDAMENTALTECHNOLOGY 15415.4ORIGINADDRESSAUTHENTICATION 15415.5ENCRYPTIONFUNCTION 15715.5.1EncryptionProcess 15815.5.2DecryptionProcess 15815.6REQUIREMENTOFHEADERFORMAT 15815.7TRUSTEDCOMPUTINGENVIRONMENT 15915.7.1EvidenceofSoftwareCode 15915.7.2AuthenticationofSoftwareCode 159PARTSIX 161TRUSTE-COMMERCE 161CHAPTER16 162E-BANKAUTHENTICATION 16216.1BACKGROUND 16216.2COUNTERBUSINESS 16316.3BUSINESSLAYER 16416.4BASICTECHNOLOGY 16616.5BUSINESSATATM 16716.6COMMUNICATIONBETWEENATMANDPORTAL 16716.7THEADVANTAGES 169CHAPTER17 171E-BILLAUTHENTICATION 17117.1BILLAUTHENTICATIONNETWORK 17117.2MAINTECHNOLOGIES 17217.3APPLICATIONFORBILLS 17317.4CIRCULATIONOFBILLS 17417.5VERIFICATIONOFCHECK 174PARTSEVEN 176TRUSTLOGISTICS 176CHAPTER18 177E-TAGAUTHENTICATION 17718.1BACKGROUND 17718.2MAINTECHNOLOGY 17818.3EMBODIMENT(Ⅰ) 18018.4EMBODIMENT(Ⅱ) 181CHAPTER19 183THEDESIGNOFMYWALLET 18319.1TWOKINDSOFAUTHENTICATIONCONCEPT 18319.2SYSTEMCONFIGURATION 18519.3TAGSTRUCTURE 18619.3.1StructureofDataRegion 18619.3.2StructureofControlRegion 18619.4TAGDATAGENERATIONANDAUTHENTICATION 18719.4.1KMC 18719.4.2Enterprise 18719.4.3WriterandReader 18819.5PROTOCOLDESIGN 18819.6CONCLUSION 190PARTEIGHT 191FILE&NETWORKMANAGEMENT 191CHAPTER20 192E-MAILAUTHENTICATION 19220.1MAINTECHNOLOGIES 19220.2SENDINGPROCESS 19320.3RECEIVINGPROCESS 194CHAPTER21 196DATASTORAGEAUTHENTICATION 19621.1SECURITYREQUIREMENTS 19621.2BASICTECHNOLOGY 19721.3FILEUPLOADINGPROTOCOL 19821.4FILEDOWNLOADINGPROTOCOL 19921.5DATASTORING 20021.5.1EstablishmentofKeyFile 20121.5.2StorageofKeyFile 20121.5.3DocumentalDatabaseEncryption 20221.5.4RelationalDatabaseEncryption 202CHAPTER22 205SECUREFILEBOX 20522.1BACKGROUND 20522.2SYSTEMFRAMEWORK 20622.3FEATURESOFTHESYSTEM 20722.4SYSTEMIMPLEMENTATION 208CHAPTER23 211E-SEALOFCLASSIFICATION 21123.1BACKGROUNDTECHNOLOGY 21123.2MAINTECHNOLOGIES 21223.3WORKINGFLOW 21423.4EMBODIMENT 21523.5EXPLANATION 216CHAPTER24 223WATER-WALLFORINTRANET 22324.1BACKGROUND 22324.2WORKINGPRINCIPLES 22424.3THEDIAGRAMOFINTRANETWATER-WALL 22524.4WATER-WALLFORINDIVIDUALPC 22824.5GUARDINGPOLICY 229CHAPTER25 230DIGITALRIGHTAUTHENTICATION 23025.1TECHNICALBACKGROUND 23025.2MAINTECHNOLOGIES 23125.3MANUFACTURER’SDIGITALRIGHT 23225.4ENTERPRISE’SRIGHTOFOPERATION 23325.5CLIENT’SRIGHTOFUSAGE 234REFERENCES 242APPENDICES 244APPENDIXA 245WALKOUTOFMYSTERIOUS“BLACKCHAMBER” 245APPENDIXB 251IDENTITYAUTHENTICATIONOPENINGANEWLANDFORINFORMATIONSECURITY 251APPENDIXC 259SEARCHINGFORSAFE“SILVERBULLET” 259APPENDIXD 269“ELECTRONICIDCARD”ATTRACTSINTERNATIONALATTENTION 269APPENDIXE 274CPKSYSTEMGOESTOTHEWORLD 274APPENDIXF 278IDENTITYAUTHENTICATIONBASEDONCPKSYSTEM 278
展开全部
配送说明
...
相似商品
为你推荐
开播时间:09月02日 10:30