Secure Key Establishment
0
Venduto da Basi6 International, Irving, TX, U.S.A.
Venditore AbeBooks dal 24 giugno 2016
Nuovi - Rilegato
Condizione: Nuovo
Quantità: 1 disponibili
Aggiungere al carrelloVenduto da Basi6 International, Irving, TX, U.S.A.
Venditore AbeBooks dal 24 giugno 2016
Condizione: Nuovo
Quantità: 1 disponibili
Aggiungere al carrelloNew. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Codice articolo ABEJUNE24-88557
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.
Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.
Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Visita la pagina della libreria
Professional Book Seller shipping from Multiple Locations Worldwide for fastest delivery possible!
All orders shipped via FedEx or DHL and delivered to your doorstep within 3-5 days. We do not ship to P.O.Boxes and a proper street address must be provided to avoid any delays.
Quantità dell?ordine | Da 21 a 36 giorni lavorativi | Da 5 a 8 giorni lavorativi |
---|---|---|
Primo articolo | EUR 0.00 | EUR 0.00 |
I tempi di consegna sono stabiliti dai venditori e variano in base al corriere e al paese. Gli ordini che devono attraversare una dogana possono subire ritardi e spetta agli acquirenti pagare eventuali tariffe o dazi associati. I venditori possono contattarti in merito ad addebiti aggiuntivi dovuti a eventuali maggiorazioni dei costi di spedizione dei tuoi articoli.