Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Protocols for authentication and key establishmentProtocols for authentication and key establishment

Protocols for authentication and key establishment

Colin Boyd, Anish Mathuria

About this book

"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students."--Jacket.

Details

OL Work ID
OL18773133W

Subjects

Computer network protocolsComputer networksSecurity measuresData encryption (Computer science)Public key infrastructure (Computer security)Computers, access control

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.