Protocols for Authentication and Key Establishment: Information Security and Cryptography
Autor Colin Boyd, Anish Mathuriaen Limba Engleză Paperback – 2 dec 2010
This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 627.98 lei 38-45 zile | |
Springer – 2 dec 2010 | 627.98 lei 38-45 zile | |
Hardback (1) | 653.38 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 8 aug 2003 | 653.38 lei 6-8 săpt. |
Din seria Information Security and Cryptography
- 20% Preț: 352.02 lei
- 20% Preț: 770.30 lei
- 20% Preț: 303.85 lei
- 20% Preț: 1452.94 lei
- 20% Preț: 988.47 lei
- 20% Preț: 327.10 lei
- 20% Preț: 636.41 lei
- 20% Preț: 453.21 lei
- 20% Preț: 607.34 lei
- 20% Preț: 331.40 lei
- 20% Preț: 406.32 lei
- 20% Preț: 346.56 lei
- 18% Preț: 950.52 lei
- 24% Preț: 795.26 lei
- 20% Preț: 595.07 lei
- 20% Preț: 487.73 lei
- Preț: 450.28 lei
- 20% Preț: 877.77 lei
- 20% Preț: 332.39 lei
- 20% Preț: 418.59 lei
- 20% Preț: 649.28 lei
- 20% Preț: 552.72 lei
- 20% Preț: 577.40 lei
- 20% Preț: 653.38 lei
- 20% Preț: 670.25 lei
- 20% Preț: 334.53 lei
- 20% Preț: 414.72 lei
- 20% Preț: 640.69 lei
Preț: 627.98 lei
Preț vechi: 784.98 lei
-20% Nou
Puncte Express: 942
Preț estimativ în valută:
120.18€ • 125.14$ • 101.57£
120.18€ • 125.14$ • 101.57£
Carte tipărită la comandă
Livrare economică 03-10 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642077166
ISBN-10: 3642077161
Pagini: 352
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.49 kg
Ediția:Softcover reprint of hardcover 1st ed. 2003
Editura: Springer
Colecția Springer
Seria Information Security and Cryptography
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642077161
Pagini: 352
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.49 kg
Ediția:Softcover reprint of hardcover 1st ed. 2003
Editura: Springer
Colecția Springer
Seria Information Security and Cryptography
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchDescriere
Protocols
for
authentication
and
key
establishment
are
the
foundation
for
security
of
communications.
The
range
and
diversity
of
these
protocols
is
immense,
while
the
properties
and
vulnerabilities
of
different
protocols
can
be
remarkably
subtle.
Here is a comprehensive and integrated treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature.
As well as a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
Here is a comprehensive and integrated treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature.
As well as a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
Cuprins
1
A
Tutorial
Introduction
to
Authentication
and
Key
Establishment.-
2
Goals
for
Authentication
and
Key
Establishment.-
3
Protocols
Using
Shared
Key
Cryptography.-
4
Authentication
and
Key
Transport
Using
Public
Key
Cryptography.-
5
Key
Agreement
Protocols.-
6
Conference
Key
Protocols.-
7
Password-Based
Protocols.-
A
Standards
for
Authentication
and
Key
Establishment.-
A.1
ISO
Standards.-
A.1.1
ISO/IEC
9798.-
A.1.2
ISO/IEC
11770.-
A.1.3
ISO
9594-8/ITU
X.509.-
A.2
Other
Standards.-
A.2.1
IETF
Standards.-
A.2.2
IEEE
P1363-2000.-
A.2.3
NIST
and
ANSI
Standards.-
B
Summary
of
Notation.-
References.-
Index
of
Protocols.-
General
Index.
Recenzii
From
the
reviews:
"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types … . will prove useful both to those who wish to learn more about the field and as a reference … ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)
"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types … . will prove useful both to those who wish to learn more about the field and as a reference … ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)
Caracteristici
Clear
and
uniform
description
of
a
comprehensive
range
of
protocols
and
attacks
Thorough referencing of the recent and established literature
A tutorial introduction for the beginner to the subject
Coverage of protocol standards
Comparison of protocol features and efficiency
Overview of protocol analysis techniques
Thorough referencing of the recent and established literature
A tutorial introduction for the beginner to the subject
Coverage of protocol standards
Comparison of protocol features and efficiency
Overview of protocol analysis techniques