Protocols for Authentication and Key Establishment / Edition 1

Protocols for Authentication and Key Establishment / Edition 1

Pub. Date:
Springer Berlin Heidelberg


View All Available Formats & Editions
Current price is , Original price is $149.0. You
Select a Purchase Option (Softcover reprint of hardcover 1st ed. 2003)
  • purchase options
    $122.80 $149.00 Save 18% Current price is $122.8, Original price is $149. You Save 18%.
  • purchase options


Protocols for Authentication and Key Establishment / Edition 1

Prools for authentication and key establishment are the foundation for security of communications. The range and diversity of these prools is immense, while the properties and vulnerabilities of different prools can be remarkably subtle.

Here is a comprehensive and integrated treatment of prools for authentication and key establishment. It allows researchers and practitioners to quickly access a prool for their needs and become aware of existing prools that have been broken in the literature.

As well as a clear and uniform presentation of the prools, this book includes a description of all the main attack types and classifies most prools in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Product Details

ISBN-13: 9783642077166
Publisher: Springer Berlin Heidelberg
Publication date: 12/01/2010
Series: Information Security and Cryptography
Edition description: Softcover reprint of hardcover 1st ed. 2003
Pages: 321
Product dimensions: 6.10(w) x 9.25(h) x 0.24(d)

About the Author

Colin Boyd is a professor in the Department of Information Security and Communication Technology at the Norwegian University of Science and Technology (NTNU) in Trondheim; he previously held faculty positions at Queensland University of Technology (QUT) and the University of Manchester. Anish Mathuria is a professor at the Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT) in Gandhinagar. Douglas Stebila is an associate professor in the Department of Combinatorics & Optimization at the University of Waterloo.

Table of Contents

Introduction to Authentication and Key Establishment.- Computational Models.- Protocols Using Shared Key Cryptography.- Authentication and Key Transport Using Public Key Cryptography.- Key Agreement Protocols.- Transport Layer Security Protocol.- Identity-Based Key Agreement.- Password-Based Protocols.- Group Key Establishment.- App. A, Standards for Authentication and Key Establishment.- App. B, Tutorial: Building a Key Establishment Protocol.- App. C, Summary of Notation.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews