Protocols for Authentication and Key Establishment
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of t...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2003
|
Ausgabe: | 1st ed. 2003 |
Schriftenreihe: | Information Security and Cryptography
|
Schlagworte: | |
Online-Zugang: | DE-706 URL des Eerstveröffentlichers |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064774 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2003 xx o|||| 00||| eng d | ||
020 | |a 9783662095270 |9 978-3-662-09527-0 | ||
024 | 7 | |a 10.1007/978-3-662-09527-0 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-662-09527-0 | ||
035 | |a (OCoLC)1227481396 | ||
035 | |a (DE-599)BVBBV047064774 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Boyd, Colin |e Verfasser |4 aut | |
245 | 1 | 0 | |a Protocols for Authentication and Key Establishment |c by Colin Boyd, Anish Mathuria |
250 | |a 1st ed. 2003 | ||
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2003 | |
300 | |a 1 Online-Ressource (XXIV, 321 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information Security and Cryptography | |
520 | |a Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students | ||
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Algorithm Analysis and Problem Complexity | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Algorithms | |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Diffie-Hellman-Algorithmus |0 (DE-588)4739863-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 1 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 0 | 2 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Diffie-Hellman-Algorithmus |0 (DE-588)4739863-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mathuria, Anish |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642077166 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783540431077 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783662095287 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-09527-0 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032471885 | |
966 | e | |u https://doi.org/10.1007/978-3-662-09527-0 |l DE-706 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1819310111154241536 |
---|---|
any_adam_object | |
author | Boyd, Colin Mathuria, Anish |
author_facet | Boyd, Colin Mathuria, Anish |
author_role | aut aut |
author_sort | Boyd, Colin |
author_variant | c b cb a m am |
building | Verbundindex |
bvnumber | BV047064774 |
classification_rvk | ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-3-662-09527-0 (OCoLC)1227481396 (DE-599)BVBBV047064774 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-09527-0 |
edition | 1st ed. 2003 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03323nam a2200661zc 4500</leader><controlfield tag="001">BV047064774</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2003 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662095270</subfield><subfield code="9">978-3-662-09527-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-09527-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-662-09527-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227481396</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064774</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Boyd, Colin</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protocols for Authentication and Key Establishment</subfield><subfield code="c">by Colin Boyd, Anish Mathuria</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2003</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXIV, 321 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information Security and Cryptography</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Diffie-Hellman-Algorithmus</subfield><subfield code="0">(DE-588)4739863-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Diffie-Hellman-Algorithmus</subfield><subfield code="0">(DE-588)4739863-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mathuria, Anish</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642077166</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783540431077</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783662095287</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-09527-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471885</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-09527-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064774 |
illustrated | Not Illustrated |
indexdate | 2024-12-24T08:35:26Z |
institution | BVB |
isbn | 9783662095270 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471885 |
oclc_num | 1227481396 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XXIV, 321 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series2 | Information Security and Cryptography |
spelling | Boyd, Colin Verfasser aut Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria 1st ed. 2003 Berlin, Heidelberg Springer Berlin Heidelberg 2003 1 Online-Ressource (XXIV, 321 p) txt rdacontent c rdamedia cr rdacarrier Information Security and Cryptography Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students Systems and Data Security Computer Communication Networks Cryptology Algorithm Analysis and Problem Complexity Computer security Computer communication systems Data encryption (Computer science) Algorithms Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Authentifikation (DE-588)4330656-1 s Schlüsselverwaltung (DE-588)4625230-7 s Kommunikationsprotokoll (DE-588)4128252-8 s Datensicherung (DE-588)4011144-1 s Diffie-Hellman-Algorithmus (DE-588)4739863-2 s DE-604 Mathuria, Anish aut Erscheint auch als Druck-Ausgabe 9783642077166 Erscheint auch als Druck-Ausgabe 9783540431077 Erscheint auch als Druck-Ausgabe 9783662095287 https://doi.org/10.1007/978-3-662-09527-0 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Boyd, Colin Mathuria, Anish Protocols for Authentication and Key Establishment Systems and Data Security Computer Communication Networks Cryptology Algorithm Analysis and Problem Complexity Computer security Computer communication systems Data encryption (Computer science) Algorithms Schlüsselverwaltung (DE-588)4625230-7 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd Authentifikation (DE-588)4330656-1 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4625230-7 (DE-588)4128252-8 (DE-588)4739863-2 (DE-588)4330656-1 (DE-588)4011144-1 |
title | Protocols for Authentication and Key Establishment |
title_auth | Protocols for Authentication and Key Establishment |
title_exact_search | Protocols for Authentication and Key Establishment |
title_full | Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria |
title_fullStr | Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria |
title_full_unstemmed | Protocols for Authentication and Key Establishment by Colin Boyd, Anish Mathuria |
title_short | Protocols for Authentication and Key Establishment |
title_sort | protocols for authentication and key establishment |
topic | Systems and Data Security Computer Communication Networks Cryptology Algorithm Analysis and Problem Complexity Computer security Computer communication systems Data encryption (Computer science) Algorithms Schlüsselverwaltung (DE-588)4625230-7 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd Authentifikation (DE-588)4330656-1 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Systems and Data Security Computer Communication Networks Cryptology Algorithm Analysis and Problem Complexity Computer security Computer communication systems Data encryption (Computer science) Algorithms Schlüsselverwaltung Kommunikationsprotokoll Diffie-Hellman-Algorithmus Authentifikation Datensicherung |
url | https://doi.org/10.1007/978-3-662-09527-0 |
work_keys_str_mv | AT boydcolin protocolsforauthenticationandkeyestablishment AT mathuriaanish protocolsforauthenticationandkeyestablishment |