skip to content
Protocols for Authentication and Key Establishment Preview this item
ClosePreview this item
Checking...

Protocols for Authentication and Key Establishment

Author: Colin Boyd; Anish Mathuria
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003.
Series: Information Security and Cryptography, Texts and Monographs.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Colin Boyd; Anish Mathuria
ISBN: 9783662095270 3662095270
OCLC Number: 851392361
Description: 1 online resource (xxiv, 323 pages).
Contents: A Tutorial Introduction to Authentication and Key Establishment --
Goals for Authentication and Key Establishment --
Protocols Using Shared Key Cryptography.-Authentication and Key Transport Using Public Key Cryptography --
Key Agreement Protocols --
Conference Key Protocols --
Password-Based Protocols --
Appendix A --
Standards for Authentication and Key Establishment --
Appendix B --
Summary of Notation --
References --
Index of Protocols --
General Index.
Series Title: Information Security and Cryptography, Texts and Monographs.
Responsibility: by Colin Boyd, Anish Mathuria.
More information:

Abstract:

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Reviews

Editorial reviews

Publisher Synopsis

From the reviews: "This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/851392361> # Protocols for Authentication and Key Establishment
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "851392361" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/833141#Place/berlin_heidelberg> ; # Berlin, Heidelberg
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
    schema:about <http://id.loc.gov/authorities/subjects/sh85029534> ; # Computer software
    schema:about <http://id.loc.gov/authorities/subjects/sh89003285> ; # Computer science
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh85035859> ; # Data protection
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://experiment.worldcat.org/entity/work/data/833141#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://id.worldcat.org/fast/872527> ; # Computer software
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/833141#Person/mathuria_anish> ; # Anish Mathuria
    schema:creator <http://experiment.worldcat.org/entity/work/data/833141#Person/boyd_colin> ; # Colin Boyd
    schema:datePublished "2003" ;
    schema:description "A Tutorial Introduction to Authentication and Key Establishment -- Goals for Authentication and Key Establishment -- Protocols Using Shared Key Cryptography.-Authentication and Key Transport Using Public Key Cryptography -- Key Agreement Protocols -- Conference Key Protocols -- Password-Based Protocols -- Appendix A -- Standards for Authentication and Key Establishment -- Appendix B -- Summary of Notation -- References -- Index of Protocols -- General Index."@en ;
    schema:description "Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/833141> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/1619-7100> ; # Information Security and Cryptography, Texts and Monographs,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/833141#Series/information_security_and_cryptography_texts_and_monographs> ; # Information Security and Cryptography, Texts and Monographs.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/833141#CreativeWork/> ;
    schema:name "Protocols for Authentication and Key Establishment"@en ;
    schema:productID "851392361" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/851392361#PublicationEvent/berlin_heidelberg_springer_berlin_heidelberg_2003> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/833141#Agent/springer_berlin_heidelberg> ; # Springer Berlin Heidelberg
    schema:url <http://dx.doi.org/10.1007/978-3-662-09527-0> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=3100251> ;
    schema:workExample <http://worldcat.org/isbn/9783662095270> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-662-09527-0> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/851392361> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/833141#Agent/springer_berlin_heidelberg> # Springer Berlin Heidelberg
    a bgn:Agent ;
    schema:name "Springer Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Person/boyd_colin> # Colin Boyd
    a schema:Person ;
    schema:familyName "Boyd" ;
    schema:givenName "Colin" ;
    schema:name "Colin Boyd" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Person/mathuria_anish> # Anish Mathuria
    a schema:Person ;
    schema:familyName "Mathuria" ;
    schema:givenName "Anish" ;
    schema:name "Anish Mathuria" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
    schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Series/information_security_and_cryptography_texts_and_monographs> # Information Security and Cryptography, Texts and Monographs.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/851392361> ; # Protocols for Authentication and Key Establishment
    schema:name "Information Security and Cryptography, Texts and Monographs." ;
    .

<http://experiment.worldcat.org/entity/work/data/833141#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029534> # Computer software
    a schema:Intangible ;
    schema:name "Computer software"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85035859> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh89003285> # Computer science
    a schema:Intangible ;
    schema:name "Computer science"@en ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
    schema:name "Computer science"@en ;
    .

<http://id.worldcat.org/fast/872527> # Computer software
    a schema:Intangible ;
    schema:name "Computer software"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://worldcat.org/entity/work/data/833141#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/851392361> ; # Protocols for Authentication and Key Establishment
    .

<http://worldcat.org/isbn/9783662095270>
    a schema:ProductModel ;
    schema:isbn "3662095270" ;
    schema:isbn "9783662095270" ;
    .

<http://worldcat.org/issn/1619-7100> # Information Security and Cryptography, Texts and Monographs,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/851392361> ; # Protocols for Authentication and Key Establishment
    schema:issn "1619-7100" ;
    schema:name "Information Security and Cryptography, Texts and Monographs," ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.