"synopsis" may belong to another edition of this title.
From the reviews:
"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types ... . will prove useful both to those who wish to learn more about the field and as a reference ... ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)
"About this title" may belong to another edition of this title.
Shipping:
£ 3.19
Within U.S.A.
Book Description Hardcover. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_3540431071
Book Description Hardcover. Condition: new. New. Seller Inventory # Wizard3540431071
Book Description Condition: new. Seller Inventory # FrontCover3540431071
Book Description Hardcover. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think3540431071
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 1.41. Seller Inventory # Q-3540431071
Book Description Condition: New. Seller Inventory # ABLIING23Mar3113020167400
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9783540431077_lsuk
Book Description Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students. 348 pp. Englisch. Seller Inventory # 9783540431077
Book Description Gebunden. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Clear and uniform description of a comprehensive range of protocols and attacksThorough referencing of the recent and established literatureA tutorial introduction for the beginner to the subjectCoverage of protocol standardsComparison of pr. Seller Inventory # 4890249
Book Description Buch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students. Seller Inventory # 9783540431077