Descripción del título
Protocols for Authenticatio...
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students
Monografía
monografia Rebiun21883885 https://catalogo.rebiun.org/rebiun/record/Rebiun21883885 m o d cr mnu---uuaaa 130203s2003 gw o 000 0 eng 934998421 936319355 9783662095270 electronic bk.) 3662095270 electronic bk.) 9783642077166 3642077161 3662095270 10.1007/978-3-662-09527-0 doi UPVA 996968190303706 AU@ eng pn AU@ GW5XE COO OCLCQ EBLCP OCLCQ YDX OCLCF UR bicssc UTN bicssc COM053000 bisacsh Boyd, Colin Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria Berlin, Heidelberg Springer Berlin Heidelberg 2003 Berlin, Heidelberg Berlin, Heidelberg Springer Berlin Heidelberg 1 online resource (xxiv, 323 pages) 1 online resource (xxiv, 323 pages) Text txt rdacontent computer c rdamedia online resource cr rdacarrier Information Security and Cryptography, Texts and Monographs 1619-7100 A Tutorial Introduction to Authentication and Key Establishment -- Goals for Authentication and Key Establishment -- Protocols Using Shared Key Cryptography.-Authentication and Key Transport Using Public Key Cryptography -- Key Agreement Protocols -- Conference Key Protocols -- Password-Based Protocols -- Appendix A -- Standards for Authentication and Key Establishment -- Appendix B -- Summary of Notation -- References -- Index of Protocols -- General Index Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students Computer science Computer Communication Networks Data protection Data encryption (Computer science) Computer software Computer science Computer software Data encryption (Computer science) Data protection Electronic books Mathuria, Anish Print version 9783642077166 Information Security and Cryptography, Texts and Monographs