TY - BOOK ID - 14295804 TI - Secure Key Establishment PY - 2009 SN - 0387879684 1441946896 9786611861308 1281861308 0387879692 PB - New York, NY : Springer US : Imprint: Springer, DB - UniCat KW - Computer network protocols. KW - Computer networks -- Security measures. KW - Data protection. KW - Public key infrastructure (Computer security). KW - Computer networks KW - Computer network protocols KW - Public key infrastructure (Computer security) KW - Telecommunications KW - Electrical & Computer Engineering KW - Engineering & Applied Sciences KW - Security measures KW - Security measures. KW - Protocols, Computer network KW - Infrastructure, Public key (Computer security) KW - PKI (Computer security) KW - Trust hierarchy (Computer security) KW - Computer network security KW - Network security, Computer KW - Security of computer networks KW - Computer science. KW - Computer communication systems. KW - Computer security. KW - Data structures (Computer science). KW - Data encryption (Computer science). KW - Coding theory. KW - Computer Science. KW - Data Encryption. KW - Data Structures, Cryptology and Information Theory. KW - Systems and Data Security. KW - Computer Communication Networks. KW - Coding and Information Theory. KW - Computer security KW - Data structures (Computer scienc. KW - Cryptology. KW - Data Structures and Information Theory. KW - Data compression (Telecommunication) KW - Digital electronics KW - Information theory KW - Machine theory KW - Signal theory (Telecommunication) KW - Computer programming KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Cryptography KW - Protection KW - Information theory. KW - Communication theory KW - Communication KW - Cybernetics KW - Communication systems, Computer KW - Computer communication systems KW - Data networks, Computer KW - ECNs (Electronic communication networks) KW - Electronic communication networks KW - Networks, Computer KW - Teleprocessing networks KW - Data transmission systems KW - Digital communications KW - Electronic systems KW - Information networks KW - Telecommunication KW - Cyberinfrastructure KW - Electronic data processing KW - Network computers KW - Information structures (Computer science) KW - Structures, Data (Computer science) KW - Structures, Information (Computer science) KW - File organization (Computer science) KW - Abstract data types (Computer science) KW - Distributed processing UR - https://www.unicat.be/uniCat?func=search&query=sysid:14295804 AB - Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security. Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare–Rogaway model and the Canetti–Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare–Rogaway model using the automated model checker tool. Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies. ER -