Artículos relacionados a certification theory and application(Chinese Edition)

certification theory and application(Chinese Edition) - Tapa blanda

 
9787302208273: certification theory and application(Chinese Edition)

Sinopsis

Language:Chinese.No Binding.publisher:Tsinghua University Press. Pub. Date :2009-11.description:Pages Number: 13222 Publisher: Tsinghua University Press. Pub. Date :2009-11. certification theory and application is a focus on information security authentication technology in teaching. The book is divided into eight chapters. mainly including cer

"Sinopsis" puede pertenecer a otra edición de este libro.

Comprar nuevo

Ver este artículo

EUR 15,51 gastos de envío desde China a Estados Unidos de America

Destinos, gastos y plazos de envío

Resultados de la búsqueda para certification theory and application(Chinese Edition)

Imagen del vendedor

LI XIAO HANG WANG HONG XIA ZHANG WEN FANG
Publicado por Tsinghua University Press, 2000
ISBN 10: 7302208271 ISBN 13: 9787302208273
Nuevo paperback

Librería: liu xing, Nanjing, JS, China

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

paperback. Condición: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 13222 Publisher: Tsinghua University Press. Pub. Date :2009-11. certification theory and application is a focus on information security authentication technology in teaching. The book is divided into eight chapters. mainly including certification basis of the theory. Hash functions and message authentication. digital signatures. entity authentication and key exchange protocols. authentication protocols. smart card technology and its application in the certification system. based on digital multimedia authentication watermarking technology. a typical utility network authentication protocols. Authentication theory and application. the main focus on the presentation of cryptography for the introduction of active attacks against authentication theory and related content. highlighting the application. combined with the author s research in related fields to introduce a new authentication technology. such as those based digital watermarking of multimedia authentication techniques. Authentication theory and application can be used as information security. computer applications and other graduate students and advanced undergraduates as well as technical staff in related fields of materials. certified for their theory and application in learning and work to provide the necessary information. Author Li Airlines. Southwest Jiaotong University College of Information Science and Technology teachers. Long talk on Theory and Application Certification and Information System Security and other courses. As a major R D personnel to participate in National Key Laboratory Fund pilot project a Science and Technology Department and the Ministry of Railways Development Project 2. and presided over a number of software development projects. academic papers published several articles. research interests and expertise: information security technology. software engineering theory and applications. Wang Hongxia. PhD. September 2002 to 2 4 June at Shanghai Jiaotong University Information and Communication Engineering postdoctoral postdoctoral more Contents: Chapter 1 certification theoretical foundation 1.1 basic concepts 1.1.1 Authentication Authentication System 1.1 System Model .2 authentication code instead of 1.1.3 forgery attack and attack probability 1.3 1.2 cheat cheat cheat probability probability lower bound of the boundary of 1.3.1 - 1.3.2 to deceive world combined probability of the lower bound - complete certification of entropy sector 1.4 Exercises Chapter 2 hash function and message text data integrity and authentication 2.1 2.1.1 hash function hash function outlined in 2.1.2 md5 algorithm 2.1.3 sha-1 algorithm 2.1.4 ripemd-160 algorithms 2.2 Identification 2.2.1 Message Encryption of packets to identify packets to achieve 2.2 .2 identify the packets using a dedicated function to achieve packet identification exercises in Chapter 3 Digital SignatureFour Satisfaction guaranteed,or money back. Nº de ref. del artículo: J22634

Contactar al vendedor

Comprar nuevo

EUR 49,00
Convertir moneda
Gastos de envío: EUR 15,51
De China a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 10 disponibles

Añadir al carrito