EUR 94,94
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Protocols for Authenticat... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Protocols for Authentication and Key Establishment (Anglais) Broché – 1 décembre 2010


Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Broché
"Veuillez réessayer"
EUR 94,94
EUR 94,94 EUR 146,37
EUR 94,94 Livraison à EUR 0,01. En stock. Expédié et vendu par Amazon. Emballage cadeau disponible.

Descriptions du produit

Protocols for Authentication and Key Establishment Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs ... Full description


Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 2 commentaires
10 internautes sur 10 ont trouvé ce commentaire utile 
A role of a menu: "Have I checked this sort of attack?" 28 novembre 2003
Par Wenbo Mao - Publié sur Amazon.com
Format: Relié
Working in industry and having served the research community reviewing cryptographic protocols for years, I have been privileged to witness a fact: designing cryptographic protocols is a no-ending job. This is an inevitable result of the fact that our society is now entering the information era for which new and diversified applicational or functional requirements for secure communications are endless. So, increasingly more new protocols will yet be invented. For a piece of supporting evidence, International Security Protocols Workshop, an annual in Cambridge University specialising in security protocols, has been 12 years. The increasing demand for new protocols has not only been responded by a large number of new research proposals authored by professional cryptographers and information security researchers, but also encouraged many security engineers in hi-tech companies to join the trade of protocol design. Notice that the population of the latter group will grow despite of the fact that the notorious difficulty of making security protocols correct has made the former group of people to litter the area with numerous flawed protocols.
The book of Boyd and Mathuria is a responsible work facing the above conflicting phenomenon. It begins with a tutorial introduction to authentication and key establishment protocols which is easily accessible by any one who wants to take up the challenging job of protocol design (it actually targets people in the second group above). It then takes an exhaustive approach to document past proposals with analysis and error demonstration. In addition, it also explains methodologies and principles for making protocols correct. Finally, it includes important standards which are vital leads to follow. So, whether you are a seasoned information security professional or an engineer aiming to become a good protocol designer, this book will help you greatly. It is worthy having a copy even for the purpose of a complete menu for protocol designers: "have I checked this sort of attack?"
THIS TEXT IS A MUST READ FOR ANYONE DEVELOPING OR STUDYING PROTOCOLS DEALING WITH AUTHENTICATION. 22 février 2015
Par Plunkett - Publié sur Amazon.com
Format: Relié Achat vérifié
MUST READ THIS TEXT. The text is ALMOST comprehensive but covers just about any thought on dealing with Authentication.
Anyone wanting to learn or consider developing a protocol needs to read this text. DUE TO THE FACT THAT THE TEXT IS A LITTLE DATED MAKES THIS TEXT "ALMOST" COMPREHENSIVE - besides that it is comprehensive.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?