Secure Key Establishment Secure Key Establishment
Advances in Information Security

Secure Key Establishment

    • 119,99 €
    • 119,99 €

Beschreibung des Verlags

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement.  Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

GENRE
Computer und Internet
ERSCHIENEN
2008
25. Oktober
SPRACHE
EN
Englisch
UMFANG
240
Seiten
VERLAG
Springer US
ANBIETERINFO
Springer Science & Business Media LLC
GRÖSSE
1,7
 MB
Drone and UAV Forensics Drone and UAV Forensics
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2025
Preserving Privacy in Data Outsourcing Preserving Privacy in Data Outsourcing
2010
Cybersecurity for Network and Information Security Cybersecurity for Network and Information Security
2026
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024