Secure Key Establishment Secure Key Establishment
Advances in Information Security

Secure Key Establishment

    • USD 119.99
    • USD 119.99

Descripción editorial

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement.  Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

GÉNERO
Informática e Internet
PUBLICADO
2008
25 de octubre
IDIOMA
EN
Inglés
EXTENSIÓN
240
Páginas
EDITORIAL
Springer US
VENDEDOR
Springer Nature B.V.
TAMAÑO
1.7
MB
Drone and UAV Forensics Drone and UAV Forensics
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2025
Security and Privacy in Social Networks and Big Data Security and Privacy in Social Networks and Big Data
2025
Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
2008
Global Initiatives to Secure Cyberspace Global Initiatives to Secure Cyberspace
2008
Primality Testing and Integer Factorization in Public-Key Cryptography Primality Testing and Integer Factorization in Public-Key Cryptography
2009
Security and Dependability for Ambient Intelligence Security and Dependability for Ambient Intelligence
2009
Cyber Situational Awareness Cyber Situational Awareness
2009
Network Intrusion Detection and Prevention Network Intrusion Detection and Prevention
2009