Secure Key Establishment Secure Key Establishment
    • $119.99

Publisher Description

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement.  Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

GENRE
Computers & Internet
RELEASED
2008
October 25
LANGUAGE
EN
English
LENGTH
240
Pages
PUBLISHER
Springer US
SELLER
Springer Nature B.V.
SIZE
1.7
MB
Design and Analysis of Cryptographic Algorithms in Blockchain Design and Analysis of Cryptographic Algorithms in Blockchain
2021
Advances in Cyber Security: Principles, Techniques, and Applications Advances in Cyber Security: Principles, Techniques, and Applications
2018
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2016
Future Challenges in Security and Privacy for Academia and Industry Future Challenges in Security and Privacy for Academia and Industry
2011
Introduction to Privacy Enhancing Technologies Introduction to Privacy Enhancing Technologies
2021
ICT Systems Security and Privacy Protection ICT Systems Security and Privacy Protection
2019
Drone and UAV Forensics Drone and UAV Forensics
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2025
Differential Privacy and Applications Differential Privacy and Applications
2017
Cybersecurity for Network and Information Security Cybersecurity for Network and Information Security
2026
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024