Secure Key Establishment
Kim-Kwang Raymond Choo
Venduto da THE SAINT BOOKSTORE, Southport, Regno Unito
Venditore AbeBooks dal 14 giugno 2006
Nuovi - Rilegato
Condizione: Nuovo
Quantità: Più di 20 disponibili
Aggiungere al carrelloVenduto da THE SAINT BOOKSTORE, Southport, Regno Unito
Venditore AbeBooks dal 14 giugno 2006
Condizione: Nuovo
Quantità: Più di 20 disponibili
Aggiungere al carrelloThis item is printed on demand. New copy - Usually dispatched within 5-9 working days 539.
Codice articolo C9780387879680
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.
Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool.
Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Visita la pagina della libreria
Please order through the Abebooks checkout. We only take orders through Abebooks - We don't take direct orders by email or phone.
Refunds or Returns: A full refund of the purchase price will be given if returned within 30 days in undamaged condition.
As a seller on abebooks we adhere to the terms explained at http://www.abebooks.co.uk/docs/HelpCentral/buyerIndex.shtml - if you require further assistance please email us at orders@thesaintbookstore.co.uk
Most orders usually ship within 1-3 business days, but some can take up to 7 days.
Quantità dell?ordine | Da 7 a 21 giorni lavorativi | Da 7 a 21 giorni lavorativi |
---|---|---|
Primo articolo | EUR 10.17 | EUR 10.17 |
I tempi di consegna sono stabiliti dai venditori e variano in base al corriere e al paese. Gli ordini che devono attraversare una dogana possono subire ritardi e spetta agli acquirenti pagare eventuali tariffe o dazi associati. I venditori possono contattarti in merito ad addebiti aggiuntivi dovuti a eventuali maggiorazioni dei costi di spedizione dei tuoi articoli.