
Secure Key Establishment
Series: Advances in Information Security; 41;
- Publisher's listprice EUR 106.99
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 9 077 Ft off)
- Discounted price 36 307 Ft (34 578 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
45 385 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1st Edition.
2nd Printing. 2008 - Publisher Springer
- Date of Publication 4 December 2008
- Number of Volumes 1 pieces, Book
- ISBN 9780387879680
- Binding Hardback
- No. of pages216 pages
- Size 235x155 mm
- Weight 524 g
- Language English
- Illustrations 24 Illustrations, black & white 0
Categories
Short description:
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare?Rogaway model and the Canetti?Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare?Rogaway model using the automated model checker tool.
Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
MoreLong description:
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare?Rogaway model and the Canetti?Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare?Rogaway model using the automated model checker tool.
Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
MoreTable of Contents:
Background Materials.- A Flawed BR95 Partnership Function.- On The Key Sharing Requirement.- Comparison of Bellare?Rogaway and Canetti?Krawczyk Models.- An Extension to the Bellare?Rogaway Model.- A Proof of Revised Yahalom Protocol.- Errors in Computational Complexity Proofs for Protocols.- On Session Key Construction.- Complementing Computational Protocol Analysis.- An Integrative Framework to Protocol Analysis and Repair.- Conclusion and Future Work.
More