Search preferences
Skip to main search results

Search filters

Product Type

  • All Product Types 
  • Books (4)
  • Magazines & Periodicals (No further results match this refinement)
  • Comics (No further results match this refinement)
  • Sheet Music (No further results match this refinement)
  • Art, Prints & Posters (No further results match this refinement)
  • Photographs (No further results match this refinement)
  • Maps (No further results match this refinement)
  • Manuscripts & Paper Collectibles (No further results match this refinement)

Condition Learn more

  • New (3)
  • As New, Fine or Near Fine (No further results match this refinement)
  • Very Good or Good (1)
  • Fair or Poor (No further results match this refinement)
  • As Described (No further results match this refinement)

Binding

Collectible Attributes

Language (2)

Price

  • Any Price 
  • Under £ 20 (No further results match this refinement)
  • £ 20 to £ 40 (No further results match this refinement)
  • Over £ 40 
Custom price range (£)

Free Shipping

  • Free Shipping to U.S.A. (No further results match this refinement)

Seller Location

  • LI XIAO HANG WANG HONG XIA ZHANG WEN FANG

    Published by Tsinghua University Press, 2000

    ISBN 10: 7302208271 ISBN 13: 9787302208273

    Seller: liu xing, Nanjing, JS, China

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    £ 43.55

    £ 13.78 shipping from China to U.S.A.

    Quantity: 10 available

    Add to basket

    paperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 13222 Publisher: Tsinghua University Press. Pub. Date :2009-11. certification theory and application is a focus on information security authentication technology in teaching. The book is divided into eight chapters. mainly including certification basis of the theory. Hash functions and message authentication. digital signatures. entity authentication and key exchange protocols. authentication protocols. smart card technology and its application in the certification system. based on digital multimedia authentication watermarking technology. a typical utility network authentication protocols. Authentication theory and application. the main focus on the presentation of cryptography for the introduction of active attacks against authentication theory and related content. highlighting the application. combined with the author s research in related fields to introduce a new authentication technology. such as those based digital watermarking of multimedia authentication techniques. Authentication theory and application can be used as information security. computer applications and other graduate students and advanced undergraduates as well as technical staff in related fields of materials. certified for their theory and application in learning and work to provide the necessary information. Author Li Airlines. Southwest Jiaotong University College of Information Science and Technology teachers. Long talk on Theory and Application Certification and Information System Security and other courses. As a major R D personnel to participate in National Key Laboratory Fund pilot project a Science and Technology Department and the Ministry of Railways Development Project 2. and presided over a number of software development projects. academic papers published several articles. research interests and expertise: information security technology. software engineering theory and applications. Wang Hongxia. PhD. September 2002 to 2 4 June at Shanghai Jiaotong University Information and Communication Engineering postdoctoral postdoctoral more Contents: Chapter 1 certification theoretical foundation 1.1 basic concepts 1.1.1 Authentication Authentication System 1.1 System Model .2 authentication code instead of 1.1.3 forgery attack and attack probability 1.3 1.2 cheat cheat cheat probability probability lower bound of the boundary of 1.3.1 - 1.3.2 to deceive world combined probability of the lower bound - complete certification of entropy sector 1.4 Exercises Chapter 2 hash function and message text data integrity and authentication 2.1 2.1.1 hash function hash function outlined in 2.1.2 md5 algorithm 2.1.3 sha-1 algorithm 2.1.4 ripemd-160 algorithms 2.2 Identification 2.2.1 Message Encryption of packets to identify packets to achieve 2.2 .2 identify the packets using a dedicated function to achieve packet identification exercises in Chapter 3 Digital SignatureFour Satisfaction guaranteed,or money back.

  • ZHAO WEN FANG . WU XI SHUI . ZHANG XIAO YANG . WANG SHU GUO

    Published by China Railway Publishing House, 2019

    ISBN 10: 7113260411 ISBN 13: 9787113260415

    Language: Chinese

    Seller: liu xing, Nanjing, JS, China

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    £ 67.82

    £ 13.78 shipping from China to U.S.A.

    Quantity: 5 available

    Add to basket

    paperback. Condition: New. Language:Chinese.Paperback. Pub Date: 88 Publisher: China Railway Press Co. Ltd. This book is written according to the requirements of China Railway Corporation Railway Turnout Usage Regulations. which fully collected the design speed 200kmm and above railways and 200 kmh is followed by the railway path model of the vehicle group train. the design speed is 200 km .

  • WANG FANG WEN ZHANG XIAO RU ZHU BIAN

    Seller: liu xing, Nanjing, JS, China

    Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

    Contact seller

    £ 55.21

    £ 13.78 shipping from China to U.S.A.

    Quantity: 1 available

    Add to basket

    paperback. Condition: Good. Lou Jing scenery.

  • £ 81.23

    £ 13.78 shipping from China to U.S.A.

    Quantity: 1 available

    Add to basket

    paperback. Condition: New. Fang Tu Shan poems (all 2).