Skip to main content

Protocols for Authentication and Key Establishment

  • Book
  • © 2003

Overview

  • Clear and uniform description of a comprehensive range of protocols and attacks
  • Thorough referencing of the recent and established literature
  • A tutorial introduction for the beginner to the subject
  • Coverage of protocol standards
  • Comparison of protocol features and efficiency
  • Overview of protocol analysis techniques
  • Includes supplementary material: sn.pub/extras

Part of the book series: Information Security and Cryptography (ISC)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (Canada)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.
This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Similar content being viewed by others

Keywords

Table of contents (7 chapters)

Reviews

From the reviews:

"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types … . will prove useful both to those who wish to learn more about the field and as a reference … ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)

Authors and Affiliations

  • School of Software Engineering and Data Communications, Queensland University of Technology, Brisbane, Australia

    Colin Boyd

  • Dhirubhai Ambani Institute of Information & Communication Technology, Gandhinagar, Gujarat, India

    Anish Mathuria

Accessibility Information

PDF accessibility summary

This PDF is not accessible. It is based on scanned pages and does not support features such as screen reader compatibility or described non-text content (images, graphs etc). However, it likely supports searchable and selectable text based on OCR (Optical Character Recognition). Users with accessibility needs may not be able to use this content effectively. Please contact us at [email protected] if you require assistance or an alternative format.

Bibliographic Information

Publish with us