Overview
- Clear and uniform description of a comprehensive range of protocols and attacks
- Thorough referencing of the recent and established literature
- A tutorial introduction for the beginner to the subject
- Coverage of protocol standards
- Comparison of protocol features and efficiency
- Overview of protocol analysis techniques
- Includes supplementary material: sn.pub/extras
Part of the book series: Information Security and Cryptography (ISC)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.
Similar content being viewed by others
Keywords
Table of contents (7 chapters)
Reviews
From the reviews:
"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types … . will prove useful both to those who wish to learn more about the field and as a reference … ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)
Authors and Affiliations
Bibliographic Information
Book Title: Protocols for Authentication and Key Establishment
Authors: Colin Boyd, Anish Mathuria
Series Title: Information Security and Cryptography
DOI: https://doi.org/10.1007/978-3-662-09527-0
Publisher: Springer Berlin, Heidelberg
-
eBook Packages: Springer Book Archive
Copyright Information: Springer-Verlag Berlin Heidelberg 2003
Hardcover ISBN: 978-3-540-43107-7Published: 08 August 2003
eBook ISBN: 978-3-662-09527-0Published: 09 March 2013
Series ISSN: 1619-7100
Series E-ISSN: 2197-845X
Edition Number: 1
Number of Pages: XXIV, 321
Topics: Systems and Data Security, Computer Communication Networks, Cryptology, Algorithm Analysis and Problem Complexity