Secure Key Establishment Secure Key Establishment
Advances in Information Security

Secure Key Establishment

    • USD 119.99
    • USD 119.99

Descripción editorial

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement.  Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

GÉNERO
Informática e Internet
PUBLICADO
2008
25 de octubre
IDIOMA
EN
Inglés
EXTENSIÓN
240
Páginas
EDITORIAL
Springer US
VENDEDOR
Springer Nature B.V.
TAMAÑO
1.7
MB

Más libros de Kim-Kwang Raymond Choo

Computer Security. ESORICS 2023 International Workshops Computer Security. ESORICS 2023 International Workshops
2024
Ubiquitous Security Ubiquitous Security
2023
A Practical Hands-on Approach to Database Forensics A Practical Hands-on Approach to Database Forensics
2022
Security and Privacy in New Computing Environments Security and Privacy in New Computing Environments
2022
Proceedings of the Seventh International Conference on Mathematics and Computing Proceedings of the Seventh International Conference on Mathematics and Computing
2022
Ubiquitous Security Ubiquitous Security
2022

Otros libros de esta serie

Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
2023
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
2023
Blockchain for Cybersecurity in Cyber-Physical Systems Blockchain for Cybersecurity in Cyber-Physical Systems
2023