4.23文创礼盒,买2个减5元 读书月福利
欢迎光临中图网 请 | 注册
> >>
网际安全技术构架-基于标识鉴别的可信系统

网际安全技术构架-基于标识鉴别的可信系统

作者:南相浩
出版社:电子工业出版社出版时间:2010-09-01
开本: 16开 页数: 248
中 图 价:¥43.1(4.9折) 定价  ¥88.0 登录后可看到会员价
暂时缺货 收藏
运费6元,满69元免运费
?快递不能达地区使用邮政小包,运费14元起
云南、广西、海南、新疆、青海、西藏六省,部分地区快递不可达
温馨提示:5折以下图书主要为出版社尾货,大部分为全新(有塑封/无塑封),个别图书品相8-9成新、切口
有划线标记、光盘等附件不全详细品相说明>>
本类五星书更多>

网际安全技术构架-基于标识鉴别的可信系统 版权信息

网际安全技术构架-基于标识鉴别的可信系统 本书特色

《网际安全技术构架:基于标识鉴别的可信系统(英文版)》:网际安全技术构架——基于标识鉴别的可信系统。

网际安全技术构架-基于标识鉴别的可信系统 内容简介

  cpk cryptosystem changes ordinary elliptic curve public key into an identity-based public key with self-assured property. self-assured public key can advance the authentication logic from object-authenticating "belief logic" to entity-authenticating "trust logic". self-assured public key system and trust logic of authentication composes the key technique of cyber security. the construction of trust connecting,computing,transaction,logistics,counter-forgery and network management will be the main contents of the next generation of information security. readers benefited from this book will be researchers and professors, experts and students, developers and policy makers, and all other who are interested in cyber security.

网际安全技术构架-基于标识鉴别的可信系统 目录

part one authentication technique
 chapter 1 basic concepts
  1.1 physical world and digital world
  1.2 a world with order and without order
  1.3 self-assured proof and 3rd party proof
  1.4 certification chain and trust chain
 1.5 centralized and decentralized management
  1.6 physical signature and digital signature
 chapter 2 authentication logic
  2.1 belief logic
  2.2 standard protocol
  2.3 trust relationship
   2.3.1 direct trust
   2.3.2 axiomatic trust
   2.3.3 inference trust
展开全部

网际安全技术构架-基于标识鉴别的可信系统 节选

《网际安全技术构架:基于标识鉴别的可信系统(英文版)》讨论了未来“网际安全”的关键技术――基于标识鉴别的可信系统,也讨论了与此相关的自证性公钥体制、信任逻辑,以及信任逻辑在可信接入、可信计算、可信交易、可信物流。网络管理中的应用,以及在互联网和物联网构成的网际空间中建立互信的基本技术,也讨论了新一代信息安全的概念和下一代绿色网络安全的发展方向。

网际安全技术构架-基于标识鉴别的可信系统 相关资料

插图:ID-card and CA certificate are different in nature. ID-card is issued by the authority,and is acertificate that uses private key variables as the main authentication parameters. CA certificate is is-sued by a third party, and is a certificate that uses public key variables as the main authenticationparameters. ID-card is issued by the authority, it can authorize. CA certificate is issued by a thirdparty,it generally cannot authorize. CA certificate needs to operate online,while ID-card can be op-erated off-line and can directly be used to authenticate identity, to establish relatively reliable trustrelationship. CA certificate of PKI indirectly establish a relatively loose trust relationship with third-party proof.

商品评论(0条)
暂无评论……
书友推荐
编辑推荐
返回顶部
中图网
在线客服