"Protocols for authentication and key establishment" - Information and Links:

Protocols for authentication and key establishment - Info and Reading Options

Book's cover
The cover of “Protocols for authentication and key establishment” - Open Library.

“Protocols for authentication and key establishment” Metadata:

  • Title: ➤  Protocols for authentication and key establishment
  • Author:

“Protocols for authentication and key establishment” Subjects and Themes:

Edition Identifiers:

  • The Open Library ID: OL18773133W

AI-generated Review of “Protocols for authentication and key establishment”:


"Protocols for authentication and key establishment" Description:

The Open Library:

"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students."--Jacket.

Read “Protocols for authentication and key establishment”:

Read “Protocols for authentication and key establishment” by choosing from the options below.

Search for “Protocols for authentication and key establishment” downloads:

Visit our Downloads Search page to see if downloads are available.

Find “Protocols for authentication and key establishment” in Libraries Near You:

Read or borrow “Protocols for authentication and key establishment” from your local library.

Buy “Protocols for authentication and key establishment” online:

Shop for “Protocols for authentication and key establishment” on popular online marketplaces.