Secure Key Establishment Secure Key Establishment
Advances in Information Security

Secure Key Establishment

    • ‏119٫99 US$
    • ‏119٫99 US$

وصف الناشر

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement.  Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٠٨
٢٥ أكتوبر
اللغة
EN
الإنجليزية
عدد الصفحات
٢٤٠
الناشر
Springer US
البائع
Springer Nature B.V.
الحجم
١٫٧
‫م.ب.‬
Data Science in Cybersecurity and Cyberthreat Intelligence Data Science in Cybersecurity and Cyberthreat Intelligence
٢٠٢٠
Digital Forensic Education Digital Forensic Education
٢٠١٩
Big Digital Forensic Data Big Digital Forensic Data
٢٠١٨
Big Digital Forensic Data Big Digital Forensic Data
٢٠١٨
Drone and UAV Forensics Drone and UAV Forensics
٢٠٢٥
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
٢٠٢٥
Secure Multi-Party Non-Repudiation Protocols and Applications Secure Multi-Party Non-Repudiation Protocols and Applications
٢٠٠٨
Global Initiatives to Secure Cyberspace Global Initiatives to Secure Cyberspace
٢٠٠٨
Primality Testing and Integer Factorization in Public-Key Cryptography Primality Testing and Integer Factorization in Public-Key Cryptography
٢٠٠٩
Security and Dependability for Ambient Intelligence Security and Dependability for Ambient Intelligence
٢٠٠٩
Cyber Situational Awareness Cyber Situational Awareness
٢٠٠٩
Network Intrusion Detection and Prevention Network Intrusion Detection and Prevention
٢٠٠٩