Protocols for Authentication and Key Establishment

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Boyd, Colin (VerfasserIn), Mathuria, Anish (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Berlin, Heidelberg Springer Berlin Heidelberg 2003
Ausgabe:1st ed. 2003
Schriftenreihe:Information Security and Cryptography
Schlagworte:
Online-Zugang:DE-706
URL des Eerstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV047064774
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 201216s2003 xx o|||| 00||| eng d
020 |a 9783662095270  |9 978-3-662-09527-0 
024 7 |a 10.1007/978-3-662-09527-0  |2 doi 
035 |a (ZDB-2-SCS)978-3-662-09527-0 
035 |a (OCoLC)1227481396 
035 |a (DE-599)BVBBV047064774 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-706 
082 0 |a 005.8  |2 23 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
100 1 |a Boyd, Colin  |e Verfasser  |4 aut 
245 1 0 |a Protocols for Authentication and Key Establishment  |c by Colin Boyd, Anish Mathuria 
250 |a 1st ed. 2003 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2003 
300 |a 1 Online-Ressource (XXIV, 321 p) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Information Security and Cryptography 
520 |a Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students 
650 4 |a Systems and Data Security 
650 4 |a Computer Communication Networks 
650 4 |a Cryptology 
650 4 |a Algorithm Analysis and Problem Complexity 
650 4 |a Computer security 
650 4 |a Computer communication systems 
650 4 |a Data encryption (Computer science) 
650 4 |a Algorithms 
650 0 7 |a Schlüsselverwaltung  |0 (DE-588)4625230-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Diffie-Hellman-Algorithmus  |0 (DE-588)4739863-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
689 0 0 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 0 1 |a Schlüsselverwaltung  |0 (DE-588)4625230-7  |D s 
689 0 2 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |D s 
689 0 3 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 4 |a Diffie-Hellman-Algorithmus  |0 (DE-588)4739863-2  |D s 
689 0 |5 DE-604 
700 1 |a Mathuria, Anish  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9783642077166 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9783540431077 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9783662095287 
856 4 0 |u https://doi.org/10.1007/978-3-662-09527-0  |x Verlag  |z URL des Eerstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
940 1 |q ZDB-2-SCS_2000/2004 
943 1 |a oai:aleph.bib-bvb.de:BVB01-032471885 
966 e |u https://doi.org/10.1007/978-3-662-09527-0  |l DE-706  |p ZDB-2-SCS  |q ZDB-2-SCS_2000/2004  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819310111154241536
any_adam_object
author Boyd, Colin
Mathuria, Anish
author_facet Boyd, Colin
Mathuria, Anish
author_role aut
aut
author_sort Boyd, Colin
author_variant c b cb
a m am
building Verbundindex
bvnumber BV047064774
classification_rvk ST 276
collection ZDB-2-SCS
ctrlnum (ZDB-2-SCS)978-3-662-09527-0
(OCoLC)1227481396
(DE-599)BVBBV047064774
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-662-09527-0
edition 1st ed. 2003
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03323nam a2200661zc 4500</leader><controlfield tag="001">BV047064774</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662095270</subfield><subfield code="9">978-3-662-09527-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-09527-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-662-09527-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227481396</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064774</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Boyd, Colin</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protocols for Authentication and Key Establishment</subfield><subfield code="c">by Colin Boyd, Anish Mathuria</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIV, 321 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Security and Cryptography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Diffie-Hellman-Algorithmus</subfield><subfield code="0">(DE-588)4739863-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Diffie-Hellman-Algorithmus</subfield><subfield code="0">(DE-588)4739863-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mathuria, Anish</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642077166</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783540431077</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783662095287</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-09527-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471885</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-09527-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV047064774
illustrated Not Illustrated
indexdate 2024-12-24T08:35:26Z
institution BVB
isbn 9783662095270
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-032471885
oclc_num 1227481396
open_access_boolean
owner DE-706
owner_facet DE-706
physical 1 Online-Ressource (XXIV, 321 p)
psigel ZDB-2-SCS
ZDB-2-SCS_2000/2004
ZDB-2-SCS ZDB-2-SCS_2000/2004
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher Springer Berlin Heidelberg
record_format marc
series2 Information Security and Cryptography
spelling Boyd, Colin Verfasser aut
Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria
1st ed. 2003
Berlin, Heidelberg Springer Berlin Heidelberg 2003
1 Online-Ressource (XXIV, 321 p)
txt rdacontent
c rdamedia
cr rdacarrier
Information Security and Cryptography
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students
Systems and Data Security
Computer Communication Networks
Cryptology
Algorithm Analysis and Problem Complexity
Computer security
Computer communication systems
Data encryption (Computer science)
Algorithms
Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf
Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf
Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd rswk-swf
Authentifikation (DE-588)4330656-1 gnd rswk-swf
Datensicherung (DE-588)4011144-1 gnd rswk-swf
Authentifikation (DE-588)4330656-1 s
Schlüsselverwaltung (DE-588)4625230-7 s
Kommunikationsprotokoll (DE-588)4128252-8 s
Datensicherung (DE-588)4011144-1 s
Diffie-Hellman-Algorithmus (DE-588)4739863-2 s
DE-604
Mathuria, Anish aut
Erscheint auch als Druck-Ausgabe 9783642077166
Erscheint auch als Druck-Ausgabe 9783540431077
Erscheint auch als Druck-Ausgabe 9783662095287
https://doi.org/10.1007/978-3-662-09527-0 Verlag URL des Eerstveröffentlichers Volltext
spellingShingle Boyd, Colin
Mathuria, Anish
Protocols for Authentication and Key Establishment
Systems and Data Security
Computer Communication Networks
Cryptology
Algorithm Analysis and Problem Complexity
Computer security
Computer communication systems
Data encryption (Computer science)
Algorithms
Schlüsselverwaltung (DE-588)4625230-7 gnd
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd
Authentifikation (DE-588)4330656-1 gnd
Datensicherung (DE-588)4011144-1 gnd
subject_GND (DE-588)4625230-7
(DE-588)4128252-8
(DE-588)4739863-2
(DE-588)4330656-1
(DE-588)4011144-1
title Protocols for Authentication and Key Establishment
title_auth Protocols for Authentication and Key Establishment
title_exact_search Protocols for Authentication and Key Establishment
title_full Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria
title_fullStr Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria
title_full_unstemmed Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria
title_short Protocols for Authentication and Key Establishment
title_sort protocols for authentication and key establishment
topic Systems and Data Security
Computer Communication Networks
Cryptology
Algorithm Analysis and Problem Complexity
Computer security
Computer communication systems
Data encryption (Computer science)
Algorithms
Schlüsselverwaltung (DE-588)4625230-7 gnd
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd
Authentifikation (DE-588)4330656-1 gnd
Datensicherung (DE-588)4011144-1 gnd
topic_facet Systems and Data Security
Computer Communication Networks
Cryptology
Algorithm Analysis and Problem Complexity
Computer security
Computer communication systems
Data encryption (Computer science)
Algorithms
Schlüsselverwaltung
Kommunikationsprotokoll
Diffie-Hellman-Algorithmus
Authentifikation
Datensicherung
url https://doi.org/10.1007/978-3-662-09527-0
work_keys_str_mv AT boydcolin protocolsforauthenticationandkeyestablishment
AT mathuriaanish protocolsforauthenticationandkeyestablishment