Skip to main content
Book cover

Protocols for Authentication and Key Establishment

  • Book
  • © 2003

Overview

  • Clear and uniform description of a comprehensive range of protocols and attacks
  • Thorough referencing of the recent and established literature
  • A tutorial introduction for the beginner to the subject
  • Coverage of protocol standards
  • Comparison of protocol features and efficiency
  • Overview of protocol analysis techniques
  • Includes supplementary material: sn.pub/extras

Part of the book series: Information Security and Cryptography (ISC)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (7 chapters)

Keywords

About this book

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.
This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.
As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Reviews

From the reviews:

"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types … . will prove useful both to those who wish to learn more about the field and as a reference … ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)

Authors and Affiliations

  • School of Software Engineering and Data Communications, Queensland University of Technology, Brisbane, Australia

    Colin Boyd

  • Dhirubhai Ambani Institute of Information & Communication Technology, Gandhinagar, Gujarat, India

    Anish Mathuria

Bibliographic Information

Publish with us