Secure Key Establishment Secure Key Establishment
    • $159.99

Publisher Description

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement.  Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

GENRE
Computing & Internet
RELEASED
2008
25 October
LANGUAGE
EN
English
LENGTH
240
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
1.7
MB
Design and Analysis of Cryptographic Algorithms in Blockchain Design and Analysis of Cryptographic Algorithms in Blockchain
2021
Advances in Cyber Security: Principles, Techniques, and Applications Advances in Cyber Security: Principles, Techniques, and Applications
2018
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2016
Future Challenges in Security and Privacy for Academia and Industry Future Challenges in Security and Privacy for Academia and Industry
2011
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2019
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2018
Drone and UAV Forensics Drone and UAV Forensics
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2025
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
2020
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Evolution of Cyber Technologies and Operations to 2035 Evolution of Cyber Technologies and Operations to 2035
2015
Cybersecurity for Network and Information Security Cybersecurity for Network and Information Security
2026
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024