商品簡介
The latest version of CPK (v6. 0) is realized on chip. The
CPK-chip carries CPK-cryptosystem
to a new stage of development. The chip not only has the function
of signature and verification, but
also has the function of encryption and decryption without any
outside support. CPK can solve the
hard problem of scaled identity authentication, minimizing the
threat of attack ( cloud computing,
quantum computing and collusion). CPK can advance the
authentication logic from "belief logic" and
"trust logic" to "truth logic". The truth logic is the foundation
of constructing authenticated (trus
ted) connecting, computing, transaction, logistics, counter -
forgery, and so on.
Readers benefited from this book will be researchers and
professors, experts and students, engi
neers and policy makers, and all others who are interested in
cyber security.
名人推薦
南相浩編著的這本《標識鑒別——網際安全技術基礎》討論了未來“網際安全”的關鍵技術——基于標識鑒別的可信系統,也討論了與此相關的自證性公鑰體制、信任邏輯,以及信任邏輯在可信接入、可信計算、可信交易、可信物流。網絡管理中的應用,以及在互聯網和物聯網構成的網際空間中建立互信的基本技術,也討論了新一代信息安全的概念和下一代綠色網絡安全的發展方向。
目次
Part One Authentication Technology
Chapter 1 Basic Concepts
Part Two Cryptosystems
Chapter 2 Authentication Logics
Chapter 3 Identity Authentication
Chapter 4 Combined Public Key (v6.0)
Chapter 5 Cryptosystem and Authentication
Chapter 6 Bytes Encryption
Part Three CPK System
Chapter 7 CPK Key Management
Chapter 8 CPK-chip Design
Chapter 9 CPK ID-card
Part Four Code Authenticaiton
Chapter 10 Software ID Authentication
Chapter 11 Windows Code Authentication
Chapter 12 Linux Code Authentication
Part Five Communication Authentication
Chapter 13 Phone Authentication
Chapter 14 SSL Communication Authentication
Chapter 15 Router Communication Authentication
Part Sixe-Commerce Authentication
Chapter 16 e-Bank Authentication
Chapter 17 e-Bill Authentication
Part Seven Logistics Authentication
Chapter 18 e-Tag Authentication
Chapter 19 e-Wallet Authentication
Part Eight Stored File Authentication
Chapter 20 Storage Authentication
Chapter 21 Secure File Box
Chapter 22 Classification Seal Authentication
Part Nine Moving Data Authentication
Chapter 23 e-Mail Authentication
Chapter 24 Digital Right Authentication
Part TenNetwork Authentication
Chapter 25 Pass Authentication
Chapter 26 Address Authentication
Appendices
References
Glossary
Technical Terms
Symbols