skip to content
Protocols for authentication and key establishment : with 31 tables Preview this item
ClosePreview this item
Checking...

Protocols for authentication and key establishment : with 31 tables

Author: Colin Boyd; Anish Mathuria
Publisher: Berlin [u.a.] : Springer, 2003.
Series: Information security and cryptography.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:

Presents a comprehensive and integrated treatment of key establishment protocols. This book is aimed mainly at researchers and security professionals, but it will also be suitable as a supplementary  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Colin Boyd; Anish Mathuria
ISBN: 3540431071 9783540431077
OCLC Number: 248732913
Description: XXIV, 321 S : graph. Darst.
Contents: 1 A Tutorial Introduction to Authentication and Key Establishment.- 2 Goals for Authentication and Key Establishment.- 3 Protocols Using Shared Key Cryptography.- 4 Authentication and Key Transport Using Public Key Cryptography.- 5 Key Agreement Protocols.- 6 Conference Key Protocols.- 7 Password-Based Protocols.- A Standards for Authentication and Key Establishment.- A.1 ISO Standards.- A.1.1 ISO/IEC 9798.- A.1.2 ISO/IEC 11770.- A.1.3 ISO 9594-8/ITU X.509.- A.2 Other Standards.- A.2.1 IETF Standards.- A.2.2 IEEE P1363-2000.- A.2.3 NIST and ANSI Standards.- B Summary of Notation.- References.- Index of Protocols.- General Index.
Series Title: Information security and cryptography.
Responsibility: Colin Boyd ; Anish Mathuria.

Reviews

Editorial reviews

Publisher Synopsis

From the reviews:"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/248732913> # Protocols for authentication and key establishment : with 31 tables
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "248732913" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/833141#Place/berlin_u_a> ; # Berlin u.a.
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/schlusselverwaltung_swd_id_46252307> ; # Schlüsselverwaltung ; SWD-ID: 46252307
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/computer_network_protocols> ; # Computer network protocols
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/authentifikation_swd_id_43306561> ; # Authentifikation ; SWD-ID: 43306561
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/kommunikationsprotokoll_swd_id_41282528> ; # Kommunikationsprotokoll ; SWD-ID: 41282528
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/computer_networks> ; # Computer networks
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/data_encryption_computer_science> ; # Data encryption (Computer science)
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/kommunikationsprotokoll> ; # Kommunikationsprotokoll
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/public_key_infrastructure_computer_security> ; # Public key infrastructure (Computer security)
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/datensicherung_swd_id_40111441> ; # Datensicherung ; SWD-ID: 40111441
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/diffie_hellman_algorithmus> ; # Diffie-Hellman-Algorithmus
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/schlusselverwaltung> ; # Schlüsselverwaltung
   schema:about <http://dewey.info/class/005.82/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/datensicherung> ; # Datensicherung
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Thing/diffie_hellman_algorithmus_swd_id_47398632> ; # Diffie-Hellman-Algorithmus ; SWD-ID: 47398632
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/authentifikation> ; # Authentifikation
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/37199047> ; # Anish Mathuria
   schema:creator <http://viaf.org/viaf/70646647> ; # Colin Boyd
   schema:datePublished "2003" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/833141> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/833141#Series/information_security_and_cryptography> ; # Information security and cryptography.
   schema:name "Protocols for authentication and key establishment : with 31 tables" ;
   schema:productID "248732913" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/248732913#PublicationEvent/berlin_u_a_springer_2003> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/833141#Agent/springer> ; # Springer
   schema:url <http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=010548008&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA> ;
   schema:url <http://www.ulb.tu-darmstadt.de/tocs/113929897.pdf> ;
   schema:url <http://swbplus.bsz-bw.de/bsz106834363cov.htm> ;
   schema:url <http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010548008&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA> ;
   schema:workExample <http://worldcat.org/isbn/9783540431077> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA363768> ;
   umbel:isLike <http://d-nb.info/968658024> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA2U2982> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/248732913> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/833141#Series/information_security_and_cryptography> # Information security and cryptography.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/248732913> ; # Protocols for authentication and key establishment : with 31 tables
   schema:name "Information security and cryptography." ;
   schema:name "Information security and cryptography" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/authentifikation_swd_id_43306561> # Authentifikation ; SWD-ID: 43306561
    a schema:Thing ;
   schema:name "Authentifikation ; SWD-ID: 43306561" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/computer_network_protocols> # Computer network protocols
    a schema:Thing ;
   schema:name "Computer network protocols" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/computer_networks> # Computer networks
    a schema:Thing ;
   schema:name "Computer networks" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Thing ;
   schema:name "Data encryption (Computer science)" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/datensicherung_swd_id_40111441> # Datensicherung ; SWD-ID: 40111441
    a schema:Thing ;
   schema:name "Datensicherung ; SWD-ID: 40111441" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/diffie_hellman_algorithmus_swd_id_47398632> # Diffie-Hellman-Algorithmus ; SWD-ID: 47398632
    a schema:Thing ;
   schema:name "Diffie-Hellman-Algorithmus ; SWD-ID: 47398632" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/kommunikationsprotokoll_swd_id_41282528> # Kommunikationsprotokoll ; SWD-ID: 41282528
    a schema:Thing ;
   schema:name "Kommunikationsprotokoll ; SWD-ID: 41282528" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/public_key_infrastructure_computer_security> # Public key infrastructure (Computer security)
    a schema:Thing ;
   schema:name "Public key infrastructure (Computer security)" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Thing/schlusselverwaltung_swd_id_46252307> # Schlüsselverwaltung ; SWD-ID: 46252307
    a schema:Thing ;
   schema:name "Schlüsselverwaltung ; SWD-ID: 46252307" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Topic/diffie_hellman_algorithmus> # Diffie-Hellman-Algorithmus
    a schema:Intangible ;
   schema:name "Diffie-Hellman-Algorithmus" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Topic/kommunikationsprotokoll> # Kommunikationsprotokoll
    a schema:Intangible ;
   schema:name "Kommunikationsprotokoll" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Topic/schlusselverwaltung> # Schlüsselverwaltung
    a schema:Intangible ;
   schema:name "Schlüsselverwaltung" ;
    .

<http://viaf.org/viaf/37199047> # Anish Mathuria
    a schema:Person ;
   schema:birthDate "1967" ;
   schema:familyName "Mathuria" ;
   schema:givenName "Anish" ;
   schema:name "Anish Mathuria" ;
    .

<http://viaf.org/viaf/70646647> # Colin Boyd
    a schema:Person ;
   schema:familyName "Boyd" ;
   schema:givenName "Colin" ;
   schema:name "Colin Boyd" ;
    .

<http://worldcat.org/isbn/9783540431077>
    a schema:ProductModel ;
   schema:isbn "3540431071" ;
   schema:isbn "9783540431077" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.