Protocols for authentication and key establishment
General Material Designation
[Book]
First Statement of Responsibility
by Colin Boyd, Anish Mathuria.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Berlin ; London
Name of Publisher, Distributor, etc.
Springer
Date of Publication, Distribution, etc.
2011
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 volume ; 24 cm
SERIES
Series Title
Information security and cryptography
CONTENTS NOTE
Text of Note
1 A Tutorial Introduction to Authentication and Key Establishment.- 2 Goals for Authentication and Key Establishment.- 3 Protocols Using Shared Key Cryptography.- 4 Authentication and Key Transport Using Public Key Cryptography.- 5 Key Agreement Protocols.- 6 Conference Key Protocols.- 7 Password-Based Protocols.- A Standards for Authentication and Key Establishment.- A.1 ISO Standards.- A.1.1 ISO/IEC 9798.- A.1.2 ISO/IEC 11770.- A.1.3 ISO 9594-8/ITU X.509.- A.2 Other Standards.- A.2.1 IETF Standards.- A.2.2 IEEE P1363-2000.- A.2.3 NIST and ANSI Standards.- B Summary of Notation.- References.- Index of Protocols.- General Index.