Linked e-resources
Details
Table of Contents
Introduction to Authentication and Key Establishment
Computational Security Models
Protocols Using Shared Key Cryptography
Authentication and Key Transport Using Public Key Cryptography
Key Agreement Protocols
Transport Layer Security Protocol
Identity-Based Key Agreement
Password-Based Protocols
Group Key Establishment
App. A, Standards for Authentication and Key Establishment
App. B, Tutorial: Building a Key Establishment Protocol
App. C, Summary of Notation.
Computational Security Models
Protocols Using Shared Key Cryptography
Authentication and Key Transport Using Public Key Cryptography
Key Agreement Protocols
Transport Layer Security Protocol
Identity-Based Key Agreement
Password-Based Protocols
Group Key Establishment
App. A, Standards for Authentication and Key Establishment
App. B, Tutorial: Building a Key Establishment Protocol
App. C, Summary of Notation.