Newsletter   Secure Checkout   View Cart (0 items)  
Search:    Welcome Guest! Save up to 30-40% on most items with our awesome everyday discounts!

Protocols for Authentication and Key Establishment [Hardcover]

Our Price $ 104.30  
Retail Value $ 149.00  
You Save $ 44.70  (30%)  
Item Number 230065  
Buy New $104.30
Out Of Stock!
Currently Out Of Stock
Currently unavailable...

Item description for Protocols for Authentication and Key Establishment by Colin Boyd & Anish Mathuria...

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can be remarkably subtle.

Here is a comprehensive and integrated treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature.

As well as a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Promise Angels is dedicated to bringing you great books at great prices. Whether you read for entertainment, to learn, or for literacy - you will find what you want at!

Item Specifications...

Pages   300
Est. Packaging Dimensions:   Length: 1" Width: 6.25" Height: 9.25"
Weight:   1.4 lbs.
Binding  Hardcover
Release Date   Sep 17, 2003
Publisher   Springer
ISBN  3540431071  
ISBN13  9783540431077  

Availability  0 units.

More About Colin Boyd & Anish Mathuria

Register your artisan biography and upload your photo! Are You The Artisan or Author behind this product?
Improve our customers experience by registering for an Artisan Biography Center Homepage.

Product Categories

1Books > Special Features > New & Used Textbooks > Computer Science & Information Systems > Networking
2Books > Special Features > New & Used Textbooks > Sciences > Mathematics
3Books > Subjects > Computers & Internet > Computer Science > Software Engineering > Information Systems
4Books > Subjects > Computers & Internet > General
5Books > Subjects > Computers & Internet > Networking > Networks, Protocols & API's > General
6Books > Subjects > Computers & Internet > Networking > Networks, Protocols & API's > Network Security
7Books > Subjects > Computers & Internet > Programming > Algorithms > Cryptography
8Books > Subjects > Computers & Internet > Web Development > Security & Encryption > Encryption
9Books > Subjects > Professional & Technical > Professional Science > Mathematics > Pure Mathematics > Discrete Mathematics
10Books > Subjects > Science > Mathematics > Pure Mathematics > Discrete Mathematics

Reviews - What do customers think about Protocols for Authentication and Key Establishment?

A role of a menu: "Have I checked this sort of attack?"  Nov 29, 2003
Working in industry and having served the research community reviewing cryptographic protocols for years, I have been privileged to witness a fact: designing cryptographic protocols is a no-ending job. This is an inevitable result of the fact that our society is now entering the information era for which new and diversified applicational or functional requirements for secure communications are endless. So, increasingly more new protocols will yet be invented. For a piece of supporting evidence, International Security Protocols Workshop, an annual in Cambridge University specialising in security protocols, has been 12 years. The increasing demand for new protocols has not only been responded by a large number of new research proposals authored by professional cryptographers and information security researchers, but also encouraged many security engineers in hi-tech companies to join the trade of protocol design. Notice that the population of the latter group will grow despite of the fact that the notorious difficulty of making security protocols correct has made the former group of people to litter the area with numerous flawed protocols.

The book of Boyd and Mathuria is a responsible work facing the above conflicting phenomenon. It begins with a tutorial introduction to authentication and key establishment protocols which is easily accessible by any one who wants to take up the challenging job of protocol design (it actually targets people in the second group above). It then takes an exhaustive approach to document past proposals with analysis and error demonstration. In addition, it also explains methodologies and principles for making protocols correct. Finally, it includes important standards which are vital leads to follow. So, whether you are a seasoned information security professional or an engineer aiming to become a good protocol designer, this book will help you greatly. It is worthy having a copy even for the purpose of a complete menu for protocol designers: "have I checked this sort of attack?"


Write your own review about Protocols for Authentication and Key Establishment

Ask A Question or Provide Feedback regarding Protocols for Authentication and Key Establishment

Item Feedback and Product Questions
For immediate assistance call 888.395.0572 during the hours of 10am thru 8pm EST Monday thru Friday and a customer care representative will be happy to help you!

Help us continuously improve our service by reporting your feedback or questions below:

I have a question regarding this product
The information above is incorrect or conflicting
The page has misspellings or incorrect grammar
The page did not load correctly in my browser or created an error.

Email Address:
Anti Spam Question. To combat spammers we require that you answer a simple question.
What color is the sky?
Leave This Blank :
Do Not Change This Text :

Add This Product Widget To Your Website

Looking to add this information to your own website? Then use our Product Widget to allow you to display product information in a frame that is 120 pixels wide by 240 pixels high.

    Copy and paste the following HTML into your website and enjoy!

Order toll-free weekdays 10am thru 10pm EST by phone: 1-888-395-0572 (Lines are closed on holidays & weekends.)
Customer Service | My Account | Track My Orders | Return Policy | Request Free Catalog | Email Newsletter

Gift Certificates
RSS Feeds
About Us
Contact Us
Terms Of Use
Privacy Policy