storiet v.2
sign in
Cover of Protocols for authentication and key establishment

a novel ·

Protocols for authentication and key establishment

by

"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. …

start reading + shelf
  • ● 93% match for you
  • ● science & technology

the long version

"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students."--Jacket.

M

Margaret's verdict

""This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware …"

— Margaret

highlights

what readers held onto

No highlights yet. Be the first.

discussion

what readers said

No reviews yet. Finish it; tell us what you found.