skip to content
Protocols for authentication and key establishment Preview this item
ClosePreview this item
Checking...

Protocols for authentication and key establishment

Author: Colin Boyd; Anish Mathuria
Publisher: Berlin ; New York : Springer, ©2003.
Series: Information security and cryptography.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Colin Boyd; Anish Mathuria
ISBN: 3540431071 9783540431077 3642077161 9783642077166
OCLC Number: 52514434
Description: xxiv, 321 pages ; 24 cm.
Contents: 1. A Tutorial Introduction to Authentication and Key Establishment --
2. Goals for Authentication and Key Establishment --
3. Protocols Using Shared Key Cryptography --
4. Authentication and Key Transport Using Public Key Cryptography --
5. Key Agreement Protocols --
6. Conference Key Protocols --
7. Password-Based Protocols --
A. Standards for Authentication and Key Establishment --
B. Summary of Notation.
Series Title: Information security and cryptography.
Responsibility: Colin Boyd, Anish Mathuria.
More information:

Abstract:

Presents a comprehensive and integrated treatment of key establishment protocols. This book is aimed mainly at researchers and security professionals, but it will also be suitable as a supplementary  Read more...

Reviews

Editorial reviews

Publisher Synopsis

From the reviews:"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/52514434> # Protocols for authentication and key establishment
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "52514434" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/833141#Place/berlin> ; # Berlin
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/chiffrement_informatique> ; # Chiffrement (Informatique)
   schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/reseaux_d_ordinateurs_securite_mesures> ; # Réseaux d'ordinateurs--Sécurité--Mesures
   schema:about <http://id.worldcat.org/fast/1082563> ; # Public key infrastructure (Computer security)
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/protocoles_de_reseaux_d_ordinateurs> ; # Protocoles de réseaux d'ordinateurs
   schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/infrastructure_a_cle_publique_securite_informatique> ; # Infrastructure à clé publique (Sécurité informatique)
   schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
   schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
   schema:about <http://id.worldcat.org/fast/872279> ; # Computer network protocols
   schema:about <http://dewey.info/class/005.82/e21/> ;
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://viaf.org/viaf/37199047> ; # Anish Mathuria
   schema:copyrightYear "2003" ;
   schema:creator <http://viaf.org/viaf/70646647> ; # Colin Boyd
   schema:datePublished "2003" ;
   schema:description "In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students."--Jacket."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/833141> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/833141#Series/information_security_and_cryptography> ; # Information security and cryptography.
   schema:name "Protocols for authentication and key establishment"@en ;
   schema:productID "52514434" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/52514434#PublicationEvent/berlin_new_york_springer_2003> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/833141#Agent/springer> ; # Springer
   schema:reviews <http://www.worldcat.org/title/-/oclc/52514434#Review/1496511812> ;
   schema:url <http://catdir.loc.gov/catdir/enhancements/fy0813/2003054427-t.html> ;
   schema:workExample <http://worldcat.org/isbn/9783540431077> ;
   schema:workExample <http://worldcat.org/isbn/9783642077166> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/52514434> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
   schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Series/information_security_and_cryptography> # Information security and cryptography.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/52514434> ; # Protocols for authentication and key establishment
   schema:name "Information security and cryptography." ;
   schema:name "Information security and cryptography" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Topic/chiffrement_informatique> # Chiffrement (Informatique)
    a schema:Intangible ;
   schema:name "Chiffrement (Informatique)"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Topic/infrastructure_a_cle_publique_securite_informatique> # Infrastructure à clé publique (Sécurité informatique)
    a schema:Intangible ;
   schema:name "Infrastructure à clé publique (Sécurité informatique)"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Topic/protocoles_de_reseaux_d_ordinateurs> # Protocoles de réseaux d'ordinateurs
    a schema:Intangible ;
   schema:name "Protocoles de réseaux d'ordinateurs"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Topic/reseaux_d_ordinateurs_securite_mesures> # Réseaux d'ordinateurs--Sécurité--Mesures
    a schema:Intangible ;
   schema:name "Réseaux d'ordinateurs--Sécurité--Mesures"@fr ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1082563> # Public key infrastructure (Computer security)
    a schema:Intangible ;
   schema:name "Public key infrastructure (Computer security)"@en ;
    .

<http://id.worldcat.org/fast/872279> # Computer network protocols
    a schema:Intangible ;
   schema:name "Computer network protocols"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
   schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
   schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/37199047> # Anish Mathuria
    a schema:Person ;
   schema:birthDate "1967" ;
   schema:familyName "Mathuria" ;
   schema:givenName "Anish" ;
   schema:name "Anish Mathuria" ;
    .

<http://viaf.org/viaf/70646647> # Colin Boyd
    a schema:Person ;
   schema:familyName "Boyd" ;
   schema:givenName "Colin" ;
   schema:name "Colin Boyd" ;
    .

<http://worldcat.org/isbn/9783540431077>
    a schema:ProductModel ;
   schema:isbn "3540431071" ;
   schema:isbn "9783540431077" ;
    .

<http://worldcat.org/isbn/9783642077166>
    a schema:ProductModel ;
   schema:isbn "3642077161" ;
   schema:isbn "9783642077166" ;
    .

<http://www.worldcat.org/title/-/oclc/52514434#Review/1496511812>
    a schema:Review ;
   schema:itemReviewed <http://www.worldcat.org/oclc/52514434> ; # Protocols for authentication and key establishment
   schema:reviewBody ""This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.