Protocols for authentication and key establishment

Protocols for authentication and key establishment
About this book
"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature.
In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students."--Jacket.
Details
- OL Work ID
- OL18773133W
Subjects
Computer network protocolsComputer networksSecurity measuresData encryption (Computer science)Public key infrastructure (Computer security)Computers, access control