Language:Chinese.No Binding.publisher:Tsinghua University Press. Pub. Date :2009-11.description:Pages Number: 13222 Publisher: Tsinghua University Press. Pub. Date :2009-11. certification theory and application is a focus on information security authentication technology in teaching. The book is divided into eight chapters. mainly including cer
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 12,78 per la spedizione da Cina a Italia
Destinazione, tempi e costiDa: liu xing, Nanjing, JS, Cina
paperback. Condizione: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 13222 Publisher: Tsinghua University Press. Pub. Date :2009-11. certification theory and application is a focus on information security authentication technology in teaching. The book is divided into eight chapters. mainly including certification basis of the theory. Hash functions and message authentication. digital signatures. entity authentication and key exchange protocols. authentication protocols. smart card technology and its application in the certification system. based on digital multimedia authentication watermarking technology. a typical utility network authentication protocols. Authentication theory and application. the main focus on the presentation of cryptography for the introduction of active attacks against authentication theory and related content. highlighting the application. combined with the author s research in related fields to introduce a new authentication technology. such as those based digital watermarking of multimedia authentication techniques. Authentication theory and application can be used as information security. computer applications and other graduate students and advanced undergraduates as well as technical staff in related fields of materials. certified for their theory and application in learning and work to provide the necessary information. Author Li Airlines. Southwest Jiaotong University College of Information Science and Technology teachers. Long talk on Theory and Application Certification and Information System Security and other courses. As a major R D personnel to participate in National Key Laboratory Fund pilot project a Science and Technology Department and the Ministry of Railways Development Project 2. and presided over a number of software development projects. academic papers published several articles. research interests and expertise: information security technology. software engineering theory and applications. Wang Hongxia. PhD. September 2002 to 2 4 June at Shanghai Jiaotong University Information and Communication Engineering postdoctoral postdoctoral more Contents: Chapter 1 certification theoretical foundation 1.1 basic concepts 1.1.1 Authentication Authentication System 1.1 System Model .2 authentication code instead of 1.1.3 forgery attack and attack probability 1.3 1.2 cheat cheat cheat probability probability lower bound of the boundary of 1.3.1 - 1.3.2 to deceive world combined probability of the lower bound - complete certification of entropy sector 1.4 Exercises Chapter 2 hash function and message text data integrity and authentication 2.1 2.1.1 hash function hash function outlined in 2.1.2 md5 algorithm 2.1.3 sha-1 algorithm 2.1.4 ripemd-160 algorithms 2.2 Identification 2.2.1 Message Encryption of packets to identify packets to achieve 2.2 .2 identify the packets using a dedicated function to achieve packet identification exercises in Chapter 3 Digital SignatureFour Satisfaction guaranteed,or money back. Codice articolo J22634
Quantità: 10 disponibili