欢迎光临
免费的PDF电子书下载网站

网际安全技术构架:基于标识鉴别的可信系统(英文版) PDF下载

编辑推荐

暂无

内容简介

  CPK Cryptosystem changes ordinary elliptic curve public key into an identity-based public key with self-assured property. Self-assured public key can advance the authentication logic from object-authenticating "belief logic" to entity-authenticating "trust logic". Self-assured public key system and trust logic of authentication composes the key technique of cyber security. The construction of trust connecting,computing,transaction,logistics,counter-forgery and network management will be the main contents of the next generation of information security. Readers benefited from this book will be researchers and professors, experts and students, developers and policy makers, and all other who are interested in cyber security.

作者简介

暂无

网际安全技术构架:基于标识鉴别的可信系统(英文版) PDF下载

目录

Part One Authentication Technique
 Chapter 1 Basic Concepts
  1.1 Physical World and Digital world
  1.2 A World with Order and without Order
  1.3 Self-assured Proof and 3rd Party Proof
  1.4 Certification Chain and Trust Chain
 1.5 Centralized and Decentralized Management
  1.6 Physical Signature and Digital Signature
 Chapter 2 Authentication Logic
  2.1 Belief Logic
  2.2 Standard Protocol
  2.3 Trust Relationship
   2.3.1 Direct Trust
   2.3.2 Axiomatic Trust
   2.3.3 Inference Trust
  2.4 Trust Logic
   2.4.1 The Requirement of Trust Logic
   2.4.2 The Progress in Public Key
   2.4.3 Entity Authenticity
   2.4.4 The Characteristics of Trust Logic
  2.5 CPK Protocol
   2.5.1 One-way Protocol
   2.5.2 Two-way Protocol
 Chapter 3 Identity Authentication
  3.1 Communication Identity Authentication
  3.2 Software Identity Authentication
  3.3 Electronic Tag Authentication
  3.4 Network Management
  3.5 Holistie Security
art Two Crypto- systems
 Chapter 4 Combined Public Key (CPK)
  4.1 Introduction
  4.2 ECC Compounding Feature
  4.3 Identity- Key
   4.3.1 Combining Matrix
   4.3.2 Mapping from Identity to Matrix Coordinates
   4.3.3 Computation of Identity-Key
  4.4 Key Compounding
   4.4.1 The Compounding of Identity-Key and Accompanying-Key (optional)
   4.4.2 The Compounding of Identity- Key and Separating- Key
  4.5 CPK Digital Signature
   4.5.1 Signing with Accompanying- Key (optional)
   4.5.2 Signing with Separating-Key
  4.6 CPK Key Exchange
   4.6.1 Key Exchange with Separating-Key
   4.6.2 Key Exchange with Accompanying-Key(optional)
  4.7 Security Analysis
Chapter 5 Self-assured and 3rd Party Public Key
  5.1 New Requirements of the Crypto-System
  5.2 Deve]opment of Crypto-Systems
  5.3 Digital Signature Mechanism
   5.3.1 IBC Signature Scheme
   5.3.2 CPK Signature with Separating-Key
   5.3.3 CPK Signature with Accompanying-Key
   5.3.4 PKI Signature Scheme
   5.3.5 IB-RSA Signature Scheme
   5.3.6 mRSA Signature Scheme
   5.3.7 Comparison of Schemes
  5.4 Key Exchange Scheme
   ……
Part Three CPK System
Part Five Trust Connecting
part Six Trust e-Commerce
Part Seven Trust Logistics
Part Eight File &; Network Management
Appendices

网际安全技术构架:基于标识鉴别的可信系统(英文版) pdf下载声明

本pdf资料下载仅供个人学习和研究使用,不能用于商业用途,请在下载后24小时内删除。如果喜欢,请购买正版

pdf下载地址

版权归出版社和作者所有,下载链接已删除。如果喜欢,请购买正版!

链接地址:网际安全技术构架:基于标识鉴别的可信系统(英文版)