更新时间:2020-05-12 15:26:25
封面
版权信息
内容简介
序言
前言
Part One Basic Theory
CHAPTER ONE CPK Public Key
CHAPTER TWO CPK Key Management
CHAPTER THREE CPK Truth Logic
CHAPTER FOUR CPK Identity Authentication
CHAPTER FIVE CPK Self-Assured Security
CHAPTER SIX CPK Virtual Network
CHAPTER SEVEN CPK Virtual Kernel
CHAPTER EIGHT CPK Digital Seal
CHAPTER NINE CPK Account Money
CHAPTER TEN CPK Systematic Security
Part Two Mair Practice
CHAPTER ELEVEN Virtual Internet
CHAPTER TWELVE Virtual Mob-Net
CHAPTER THIRTEEN RFID Anti-Fake Label
CHAPTER FOURTEEN Paper Anti-Fake Label
CHAPTER FIFTEEN File Classification
CHAPTER SIXTEEN CPK Video Monitoring
CHAPTER SEVENTEEN CPK Cloud Storage
CHAPTER EIGHTEEN Byte Encryption
CHAPTER NINETEEN Cyber Attack
CHAPTER TWENTY Situational Awareness
COMMENTS
COMMENT 1 The CPK Algorithm for Key Management
COMMENT 2 Identity Authentication Opening a New Land for Information Security
COMMENT 3 “Electronic ID Card” Attracts International Attention
COMMENT 4 CPK Goes to the World
COMMENT 5 Identity Authentication Based on CPK
COMMENT 6 To Construct Self-Assured Network System with CPK Technology
INTERVIEWS
Interview 1 Don't Lock Enthusiasm
Interview 2 Walk out of Mysterious “Black Chamber”
Interview 3 Searching for Safe “Silver Bullet”
NOTES
About the Author
反侵权盗版声明