• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • Secure Key Establishment

    Secure Key Establishment by Choo, Kim-Kwang Raymond;

    Series: Advances in Information Security; 41;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 106.99
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        45 385 Ft (43 223 Ft + 5% VAT)
      • Discount 20% (cc. 9 077 Ft off)
      • Discounted price 36 307 Ft (34 578 Ft + 5% VAT)

    45 385 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Short description:

    Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.


    Secure Key Establishment identifies several variants of the key sharing requirement.  Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare?Rogaway model and the Canetti?Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare?Rogaway model using the automated model checker tool.


    Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

    More

    Long description:

    Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.


    Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare?Rogaway model and the Canetti?Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare?Rogaway model using the automated model checker tool.


    Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

    More

    Table of Contents:

    Background Materials.- A Flawed BR95 Partnership Function.- On The Key Sharing Requirement.- Comparison of Bellare?Rogaway and Canetti?Krawczyk Models.- An Extension to the Bellare?Rogaway Model.- A Proof of Revised Yahalom Protocol.- Errors in Computational Complexity Proofs for Protocols.- On Session Key Construction.- Complementing Computational Protocol Analysis.- An Integrative Framework to Protocol Analysis and Repair.- Conclusion and Future Work.

    More