CPK通向赛博安全之路:理论与实践CPK Solution to Cyber Security:Theory and Practice - (EPUB全文下载)

文件大小:0.5 mb。
文件格式:epub 格式。
书籍内容:

CPK通向赛博安全之路:理论与实践CPK Solution to Cyber Security:Theory and Practice
Part One Basic Theory
1.2 Combination Matrix
1.3 Combination Key
1.4 Annual Key
1.5 Digital Signature
1.6 Key Encryption
1.7 Security Analysis
Summary
References
CHAPTER TWO CPK Key Management
2.2 Application for Key
2.3 Key Protection
2.4 Key Distribution
2.5 Digital Signature
2.6 Key Encryption
2.7 Key Update
2.8 Data Encryption
Summary
CHAPTER THREE CPK Truth Logic
3.2 Trust Logic
3.3 Truth Logic
3.4 Authentication Protocols
Summary
References
CHAPTER FOUR CPK Identity Authentication
4.2 Formation of Identity Authentication
4.3 Requirement of Virtual Network
4.4 Requirement of Proof-before-Event
4.5 Requirement of Network Order
4.6 Requirement of Holistic Solution
CHAPTER FIVE CPK Self-Assured Security
5.2 Components of Assurance
5.3 Realization of Assuance
5.4 Location of Assurance
CHAPTER SIX CPK Virtual Network
6.2 Provable Linkage
6.3 IoT and IoE
6.4 Compound Event
Summary
References
CHAPTER SEVEN CPK Virtual Kernel
7.2 Software Seal
7.3 Software Upload
7.4 Software Execution
7.5 Realization of Kernel
7.6 Security Policy
Summary
CHAPTER EIGHT CPK Digital Seal
CHAPTER NINE CPK Account Money
9.2 Digital Seal for Account Money
9.3 Face-to-Face Payment
9.4 Remote Payment
9.5 Account Settlement
9.6 Evidence Chain
9.7 Link Integrity
Summary
References
CHAPTER TEN CPK Systematic Security
10.2 Formation of Identity Authentication
10.3 Formation of Assurance Security
10.4 Formation of Virtual Network
10.5 Formation of Structured Solution
10.6 Formation of New Security Principles
Part Two Mair Practice
11.2 Key Technique of Provable Internet
11.3 The Structure of Virtual Internet
11.4 Authentication of Users
11.5 Implementation Protocol
Summary
References
CHAPTER TWELVE Virtual Mob-Net
12.2 Virtual Connection
Summary
CHAPTER THIRTEEN RFID Anti-Fake Label
13.2 System Structure
13.3 Protocol Design
CHAPTER FOURTEEN Paper Anti-Fake Label
14.2 Vertical Certification Chain
14.3 Horizontal Certification Chain
14.4 Effectiveness of Certification Chain
Summary
CHAPTER FIFTEEN File Classification
15.2 Digital Seal for File
15.3 File Creating
15.4 File Verifying
15.5 File Sending
15.6 File Management
Summary
CHAPTER SIXTEEN CPK Video Monitoring
16.2 Digital Seal
16.3 Identity Definition
16.4 Provable Access
16.5 Transmission Encryption
16.6 Forward Encryption
16.7 Provable Storage
16.8 Network Layout
16.9 Key Distribution
Summary
CHAPTER SEVENTEENCPK Cloud Storage
17.2 Document File Control
17.3 Table ............

以上为书籍内容预览,如需阅读全文内容请下载EPUB源文件,祝您阅读愉快。

版权声明:书云(openelib.org)是世界上最大的在线非盈利图书馆之一,致力于让每个人都能便捷地了解我们的文明。我们尊重著作者的知识产权,如您认为书云侵犯了您的合法权益,请参考版权保护声明,通过邮件openelib@outlook.com联系我们,我们将及时处理您的合理请求。 数研咨询 流芳阁 研报之家 AI应用导航 研报之家
书云 Open E-Library » CPK通向赛博安全之路:理论与实践CPK Solution to Cyber Security:Theory and Practice - (EPUB全文下载)