安全协议理论与方法——信息安全国家重点实验室信息安全丛书 - Softcover

9787030122773: 安全协议理论与方法——信息安全国家重点实验室信息安全丛书
View all copies of this ISBN edition:
 
 
  • ISBN 10 7030122771
  • ISBN 13 9787030122773
  • BindingPaperback

Shipping: £ 11.79
From China to U.S.A.

Destination, rates & speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace

Stock Image

FAN HONG . FENG DENG GUO BIAN ZHU
Published by Science Press (2003)
ISBN 10: 7030122771 ISBN 13: 9787030122773
New paperback Quantity: 1
Seller:
liu xing
(Nanjing JiangSu, JS, China)

Book Description paperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2003-10-01 Pages: 421 Publisher: Science Press title: the security protocol Theory and method - State Key Laboratory of Information Security Information Security Series List Price: 42.00 yuan: Fan Hong. FENG Deng ed Publisher: Science Press Publication Date :2003-10-1ISBN: 9787030122773 Words: 532.000 yds: 421 Edition: 1 Binding: Paperback: Weight: Editor's Choice \ t \ t \ t \ t Summary book State Key Laboratory of Information Security Information Security Series one. The book systematically introduces the theory and method of computer network security protocols. the main contents include the basic concepts of the security agreement. defects. and may be affected by the type of attack. based on the reasoning structured approach. structured approach based on attack prove structural-based approach formalized interfaces. security protocol analysis. formal methods of security protocol design. Kerberos protocol. IPSec protocol. SSL protocol. X 509. and the SET protocol. The book can be used as a teaching reference books of the institutions of higher learning of computer. communication. and information security professional. also available in the relevant professional teaching. scientific research and engineering and technical personnel reference. Contents Chapter 1 Introduction 1.1 the cryptosystems 1.2 digital signature key management and distribution of 1.3 Hash Functions 1.4 1.5 PKI 2.3 security protocols of Chapter 2 of the Public Key Infrastructure security protocol 2.1 security protocols Overview 2.2 security protocol defects and its been attacks instance 2.4 Security Protocol Formal Analysis Summary Chapter 3 3.2 GNY logic-based reasoning structured approach 3.1 BAN logic the 3.3 AT logical 3.4 SVO logic logic 3.6 CS 3.5 Kailar logic 3.7 KG logic 3.8 Nonmonotomic logic Summary Chapter 4 attack structural-based approach 4.1 Summary Chapter 5 of the validation of the general-purpose language 4.2 single algebraic theory model 4.3 Special purpose expert system based on the proof structured approach 5.1 human-readable proof method 5.2 Paulson induction 5.3 Schneider rank function 5.4 strand space 5.5 Attacks 5.6 Rewriting limited law approximation method 5.8 invariant 5.7 Maude Analysis Summary Chapter 6. the formal language of the Security Protocol Analysis 6.1 security protocol analysis predicts: CPAL 6.2 security protocols Interface Description Language - ISL & AAPA 6.3 security protocol analysis Universal Description the language - CAPSL 6.4 security protocols security protocol compiler Casper 5.5 Points - spi integral Summary Chapter 7 formal methods of security protocol designed 7.1 Heintze. & Tygar: model and its components 7.2 Gong & Synersion: fail-stop protocol 7.3 Buttyan & Staaman simple logic 7.4 Rudolph abstract the model Summary Chapter 8 the Kerberos 8.1 Kerberos protocol Overview 8.2 bills to use the logo with the requested 8.3 message exchange 8.4 ULTRIX operating system implementations of Kerberos on Chapter 9 IPSec protocol the 9.4 IPSec the 9.1 IPSec Architecture 9.2 Security Alliance 9.3 IPSec security protocol application 1O 10.6 handshake protocol layer Chapter 11 of the state chapter SSL V3.0 10.1 SSL V3.0 Overview 10.2 SSL V3.0 10.4 Change Cipher Spec the 10.3 recording layer protocol agreement 10.5 Alert protocol X.509 11.1 X.509 v3 certificates Overview 11.2 certificate its expansion Inspection 11.5 11.3 CRL its extended 11.4 proof path algorithm supports 12.2 12.1 Background and Business requirements of Chapter 12 of the SET protocol system design 12.3 certificate management structure 12.4 certificate request protocol 12.5 Certificate Revocation 12.6 SET private extension References Author \ t \ t Digest preambleFour Satisfaction guaranteed,or money back. Seller Inventory # FS032258

More information about this seller | Contact seller

Buy New
£ 48.58
Convert currency

Add to Basket

Shipping: £ 11.79
From China to U.S.A.
Destination, rates & speeds