certification theory and application
LI XIAO HANG WANG HONG XIA ZHANG WEN FANG
Sold by liu xing, Nanjing, JS, China
AbeBooks Seller since April 7, 2009
New - Soft cover
Condition: New
Quantity: 10 available
Add to basketSold by liu xing, Nanjing, JS, China
AbeBooks Seller since April 7, 2009
Condition: New
Quantity: 10 available
Add to basketShip out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 13222 Publisher: Tsinghua University Press. Pub. Date :2009-11. certification theory and application is a focus on information security authentication technology in teaching. The book is divided into eight chapters. mainly including certification basis of the theory. Hash functions and message authentication. digital signatures. entity authentication and key exchange protocols. authentication protocols. smart card technology and its application in the certification system. based on digital multimedia authentication watermarking technology. a typical utility network authentication protocols. Authentication theory and application. the main focus on the presentation of cryptography for the introduction of active attacks against authentication theory and related content. highlighting the application. combined with the author s research in related fields to introduce a new authentication technology. such as those based digital watermarking of multimedia authentication techniques. Authentication theory and application can be used as information security. computer applications and other graduate students and advanced undergraduates as well as technical staff in related fields of materials. certified for their theory and application in learning and work to provide the necessary information. Author Li Airlines. Southwest Jiaotong University College of Information Science and Technology teachers. Long talk on Theory and Application Certification and Information System Security and other courses. As a major R D personnel to participate in National Key Laboratory Fund pilot project a Science and Technology Department and the Ministry of Railways Development Project 2. and presided over a number of software development projects. academic papers published several articles. research interests and expertise: information security technology. software engineering theory and applications. Wang Hongxia. PhD. September 2002 to 2 4 June at Shanghai Jiaotong University Information and Communication Engineering postdoctoral postdoctoral more Contents: Chapter 1 certification theoretical foundation 1.1 basic concepts 1.1.1 Authentication Authentication System 1.1 System Model .2 authentication code instead of 1.1.3 forgery attack and attack probability 1.3 1.2 cheat cheat cheat probability probability lower bound of the boundary of 1.3.1 - 1.3.2 to deceive world combined probability of the lower bound - complete certification of entropy sector 1.4 Exercises Chapter 2 hash function and message text data integrity and authentication 2.1 2.1.1 hash function hash function outlined in 2.1.2 md5 algorithm 2.1.3 sha-1 algorithm 2.1.4 ripemd-160 algorithms 2.2 Identification 2.2.1 Message Encryption of packets to identify packets to achieve 2.2 .2 identify the packets using a dedicated function to achieve packet identification exercises in Chapter 3 Digital SignatureFour Satisfaction guaranteed,or money back.
Seller Inventory # J22634
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...
Most orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.
Order quantity | 16 to 30 business days | 8 to 16 business days |
---|---|---|
First item | US$ 18.00 | US$ 30.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.