Protocols for authentication and key establishment: with 31 tables
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2003
|
Schriftenreihe: | Information security and cryptography
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. 295 - 316 |
Beschreibung: | XXIV, 321 S. graph. Darst. |
ISBN: | 3540431071 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV017515092 | ||
003 | DE-604 | ||
005 | 20140207 | ||
007 | t | ||
008 | 030916s2003 gw d||| |||| 00||| eng d | ||
016 | 7 | |a 968658024 |2 DE-101 | |
020 | |a 3540431071 |9 3-540-43107-1 | ||
035 | |a (OCoLC)248732913 | ||
035 | |a (DE-599)BVBBV017515092 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-824 |a DE-M347 |a DE-92 |a DE-384 |a DE-522 |a DE-634 |a DE-11 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.82 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 252f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Boyd, Colin |d 1959- |e Verfasser |0 (DE-588)1036721086 |4 aut | |
245 | 1 | 0 | |a Protocols for authentication and key establishment |b with 31 tables |c Colin Boyd ; Anish Mathuria |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2003 | |
300 | |a XXIV, 321 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information security and cryptography | |
500 | |a Literaturverz. S. 295 - 316 | ||
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Diffie-Hellman-Algorithmus |0 (DE-588)4739863-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 1 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 0 | 2 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Diffie-Hellman-Algorithmus |0 (DE-588)4739863-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mathuria, Anish |e Verfasser |4 aut | |
856 | 4 | 2 | |m HEBIS Datenaustausch Darmstadt |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010548008&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-010548008 |
Datensatz im Suchindex
_version_ | 1804130303755681792 |
---|---|
adam_text | COLIN BOYD * ANISH MATHURIA PROTOCOLS FOR AUTHENTICATION AND KEY
ESTABLISHMENT WITH 12 FIGURES AND 31 TABLES SPRINGER CONTENTS LIST OF
PROTOCOLS XVII LIST OF ATTACKS XXIII 1 A TUTORIAL INTRODUCTION TO
AUTHENTICATION AND KEY ESTABLISHMENT 1 1.1 INTRODUCTION 1 1.2 BUILDING A
KEY ESTABLISHMENT PROTOCOL 2 1.2.1 CONFIDENTIALITY 4 1.2.2
AUTHENTICATION 5 1.2.3 REPLAY 8 1.3 PROTOCOL ARCHITECTURES 12 1.3.1
EXISTING CRYPTOGRAPHIC KEYS 12 1.3.2 METHOD OF SESSION KEY GENERATION 13
1.3.3 NUMBER OF USERS 13 1.3.4 EXAMPLE 13 1.4 CRYPTOGRAPHIC PROPERTIES
14 1.4.1 CONFIDENTIALITY 16 1.4.2 DATA ORIGIN AUTHENTICATION AND DATA
INTEGRITY 17 1.4.3 NON-REPUDIATION 18 1.4.4 EXAMPLES OF CRYPTOGRAPHIC
ALGORITHMS 19 1.4.5 SECRET SHARING 20 1.5 FRESHNESS 21 1.6 TYPES OF
ATTACK ON PROTOCOLS 23 1.6.1 EAVESDROPPING 24 1.6.2 MODIFICATION 25
1.6.3 REPLAY 25 1.6.4 PREPLAY 25 1.6.5 REFLECTION . 25 1.6.6 DENIAL OF
SERVICE 27 1.6.7 TYPING ATTACKS 28 1.6.8 CRYPTANALYSIS 29 XII CONTENTS
1.6.9 CERTIFICATE MANIPULATION 30 1.6.10 PROTOCOL INTERACTION 31 1.7
DESIGN PRINCIPLES FOR CRYPTOGRAPHIC PROTOCOLS 31 2 GOALS FOR
AUTHENTICATION AND KEY ESTABLISHMENT 33 2.1 INTRODUCTION 33 2.2 BASIC
GOALS 35 2.2.1 MODELS OF SECURITY 35 2.2.2 KEY ESTABLISHMENT OR
AUTHENTICATION? 36 2.2.3 USER-ORIENTED GOALS 38 2.2.4 KEY-ORIENTED GOALS
40 2.3 ENHANCED GOALS 41 2.3.1 A HIERARCHY OF PROTOCOL GOALS 41 2.3.2
EXAMPLE: STS PROTOCOL 44 2.3.3 INTENSIONAL AND EXTENSIONAL GOALS 46
2.3.4 PROTOCOL EFFICIENCY 47 2.3.5 RESPONSIBILITY AND CREDIT 48 2.4
GOALS CONCERNING COMPROMISED KEYS 49 2.4.1 FORWARD SECRECY 50 2.4.2 KEY
COMPROMISE IMPERSONATION 52 2.5 FORMAL VERIFICATION OF PROTOCOLS 52
2.5.1 FDR 53 2.5.2 MUR 56 2.5.3 BRUTUS 57 2.5.4 NRL ANALYZER 58 2.5.5
BAN LOGIC 59 2.5.6 STRAND SPACE MODEL 62 2.5.7 THE INDUCTIVE MODEL 63
2.5.8 COMPARISON OF FORMAL METHODS APPROACHES 65 2.6
COMPLEXITY-THEORETIC PROOFS OF SECURITY 66 2.6.1 MODEL OF COMMUNICATION
67 2.6.2 DEFINING SECURITY 68 2.6.3 SHOUP S SIMULATION MODEL 69 2.6.4 A
MODULAR APPROACH TO PROOFS 71 2.7 CONCLUSION 71 3 PROTOCOLS USING SHARED
KEY CRYPTOGRAPHY 73 3.1 INTRODUCTION 73 3.2 ENTITY AUTHENTICATION
PROTOCOLS 75 3.2.1 BIRD-GOPAL-HERZBERG-JANSON-KUTTEN-MOLVA-YUNG
PROTOCOLS 75 3.2.2 BELLARE-ROGAWAY MAPI PROTOCOL , 76 3.2.3 ISO/IEC
9798-2 PROTOCOLS 77 3.2.4 WOO-LAM AUTHENTICATION PROTOCOL 78 3.2.5
COMPARISON OF ENTITY AUTHENTICATION PROTOCOLS 80 CONTENTS XIII 3.3
SERVER-LESS KEY ESTABLISHMENT 80 3.3.1 ANDREW SECURE RPC PROTOCOL 81
3.3.2 JANSON-TSUDIK 2PKDP PROTOCOL 83 3.3.3 BOYD TWO-PASS PROTOCOL 83
3.3.4 ISO/IEC 11770-2 SERVER-LESS PROTOCOLS 84 3.3.5 COMPARISON OF
SERVER-LESS PROTOCOLS 86 3.4 SERVER-BASED KEY ESTABLISHMENT 87 3.4.1
NEEDHAM-SCHROEDER SHARED KEY PROTOCOL 87 3.4.2 OTWAY-REES PROTOCOL 88
3.4.3 KERBEROS PROTOCOL 91 3.4.4 ISO/IEC 11770-2 SERVER-BASED PROTOCOLS
93 3.4.5 WIDE-MOUTHED-FROG PROTOCOL 94 3.4.6 YAHALOM PROTOCOL 95 3.4.7
JANSON-TSUDIK 3PKDP PROTOCOL 97 3.4.8 BELLARE-ROGAWAY 3PKD PROTOCOL 98
3.4.9 WOO-LAM KEY TRANSPORT PROTOCOL 99 3.4.10 GONG KEY AGREEMENT
PROTOCOLS 100 3.4.11 BOYD KEY AGREEMENT PROTOCOL 101 3.4.12 GONG HYBRID
PROTOCOL 102 3.4.13 COMPARISON OF SERVER-BASED PROTOCOLS 103 3.5 KEY
ESTABLISHMENT USING MULTIPLE SERVERS 104 3.5.1 GONG S MULTIPLE SERVER
PROTOCOL 104 3.5.2 CHEN-GOLLMANN-MITCHELL PROTOCOL 105 3.6 CONCLUSION
106 AUTHENTICATION AND KEY TRANSPORT USING PUBLIC KEY CRYPTOGRAPHY 107
4.1 INTRODUCTION 107 4.1.1 NOTATION 108 4.1.2 DESIGN PRINCIPLES FOR
PUBLIC KEY PROTOCOLS 108 4.2 ENTITY AUTHENTICATION PROTOCOLS 110 4.2.1
PROTOCOLS IN ISO/IEC 9798-3 110 4.2.2 PROTOCOLS IN ISO/IEC 9798-5 113
4.2.3 SPLICE/AS 113 4.2.4 COMPARISON OF ENTITY AUTHENTICATION PROTOCOLS
115 4.3 KEY TRANSPORT PROTOCOLS 116 4.3.1 PROTOCOLS IN ISO/IEC 11770-3
116 4.3.2 BLAKE-WILSON AND MENEZES PROVABLY SECURE KEY TRANSPORT
PROTOCOL 120 4.3.3 NEEDHAM-SCHROEDER PUBLIC KEY PROTOCOL 121 4.3.4
PROTOCOLS IN THE X.509 STANDARD 122 4.3.5 TLS PROTOCOL 124 4.3.6
BELLER-CHANG-YACOBI PROTOCOLS 126 4.3.7 TMN PROTOCOL 131 4.3.8 AKA
PROTOCOL 132 )N OF KEY TRANSPORT PROTOCOLS 133 134 3TOCOLS 137 137 :OL
138 KEY-SHARE ATTACKS 139 KEY AGREEMENT 140 ^EY AGREEMENT 141 GROUP
ATTACKS 144 ENCRYPTION AND ONE-PASS KEY ESTABLISHMENT. 144 3 ROTOCOL
USING STATIC DIFFIE*HELLMAN 146 : 147 IGROUP ATTACK ON MTI PROTOCOLS 149
KEY-SHARE ATTACKS ON MTI PROTOCOLS 150 TTACK ON MTI PROTOCOLS 151 ITION
ATTACK OF JUST AND VAUDENAY 152 ATTACKS ON MTI PROTOCOLS 153 SECRECY AND
KEY COMPROMISE IMPERSONATION ROTOCOLS 154 IASED PROTOCOLS WITH BASIC
MESSAGE FORMAT... 155 PROTOCOL 156 TOCOL 157 ED MODEL PROTOCOL 158
ITOCOL 159 D ROTOCOL 160 STEINER-TSUDIK PROTOCOL 161 IENAY-SONG-KIM
PROTOCOL 162 EY CONFIRMATION 163 ON 164 5ASED PROTOCOLS WITH ENHANCED
MESSAGE 165 OCOL 166 ROTOCOL 168 PROTOCOL 172 EY EXCHANGE 174 ROTOCOL
178 PROTOCOLS 179 )SHIDA PROTOCOL 180 ON 181 ICHEMES 182 S SCHEME 184 5
SCHEME 186 SCHEME 188 USING SIGNATURES WITH MESSAGE RECOVERY 190
CONTENTS XV 5.7 PROTOCOLS DESIGNED FOR COMPUTATIONALLY LIMITED DEVICES
190 5.7.1 YACOBI-SHMUELY PROTOCOL 191 5.7.2 ASPECT PROTOCOL 192 5.7.3
JAKOBSSON-POINTCHEVAL PROTOCOL 193 5.8 PROTOCOLS IN ISO/IEC 11770-3 195
5.9 DIFFIE-HELLMAN KEY AGREEMENT IN OTHER GROUPS 196 5.10 PROTOCOLS NOT
BASED ON DIFFIE-HELLMAN 197 5.10.1 SKEME WITHOUT FORWARD SECRECY 197
5.10.2 KEY PRE-DISTRIBUTION SCHEMES 198 5.11 CONCLUSION 199 CONFERENCE
KEY PROTOCOLS 201 6.1 INTRODUCTION 201 6.1.1 GENERALISED SECURITY GOALS
202 6.1.2 STATIC AND DYNAMIC GROUPS 203 6.1.3 NOTATION 204 6.2
GENERALISING DIFFIE-HELLMAN KEY AGREEMENT 204 6.2.1
INGEMARSSON-TANG-WONG KEY AGREEMENT 204 6.2.2 STEINER-TSUDIK-WAIDNER KEY
AGREEMENT 206 6.2.3 STEER-STRAWCZYNSKI-DIFFIE-WIENER KEY AGREEMENT 209
6.2.4 PERRIG S GENERALISED DIFFIE-HELLMAN 210 6.2.5 BECKER AND WILLE S
OCTOPUS PROTOCOL 212 6.2.6 BURMESTER-DESMEDT KEY AGREEMENT 214 6.2.7
JOUX S TRIPARTITE DIFFIE-HELLMAN 215 6.2.8 SECURITY OF GENERALISED
DIFFIE-HELLMAN 216 6.2.9 EFFICIENCY OF GENERALISED DIFFIE-HELLMAN 217
6.3 CONFERENCE KEY AGREEMENT PROTOCOLS 219 6.3.1 AUTHENTICATING
GENERALISED DIFFIE-HELLMAN 219 6.3.2 KLEIN-OTTEN-BETH PROTOCOL 220 6.3.3
AUTHENTICATED GDH PROTOCOLS 221 6.4 IDENTITY-BASED CONFERENCE KEY
PROTOCOLS 225 6.4.1 KOYAMA AND OHTA PROTOCOLS 226 6.4.2 PROTOCOLS OF
SAEEDNIA AND SAFAVI-NAINI 229 6.5 CONFERENCE KEY AGREEMENT WITHOUT
DIFFIE-HELLMAN 230 6.5.1 PIEPRZYK AND LI S KEY AGREEMENT PROTOCOL 230
6.5.2 TZENG-TZENG PROTOCOLS 232 6.5.3 BOYD S CONFERENCE KEY AGREEMENT
233 6.6 CONFERENCE KEY TRANSPORT PROTOCOLS 235 6.6.1 BURMESTER-DESMEDT
STAR AND TREE PROTOCOLS 235 6.6.2 MAYER AND YUNG S PROTOCOLS 237 6.6.3
KEY HIERARCHIES 239 6.7 KEY BROADCASTING PROTOCOLS 240 6.7.1 KEY
BROADCASTING USING NUMBER THEORY 242 6.7.2 KEY BROADCASTING USING SECRET
SHARING 244 6.8 CONCLUSION 245 XVI CONTENTS 7 PASSWORD-BASED PROTOCOLS
247 7.1 INTRODUCTION ... 247 7.2 ENCRYPTED KEY EXCHANGE USING
DIFFIE-HELLMAN 250 7.2.1 BELLOVIN-MERRITT S ORIGINAL EKE 250 7.2.2 THE
PAK PROTOCOL 252 7.2.3 SPEKE 256 7.2.4 KATZ-OSTROVSKY-YUNG PROTOCOL 258
7.3 AUGMENTED EKE 260 7.3.1 B-SPEKE 263 7.3.2 SRP PROTOCOL 264 7.3.3 AMP
PROTOCOL 265 7.4 THREE-PARTY EKE 266 7.4.1 GLNS SECRET PUBLIC KEY
PROTOCOLS 267 7.4.2 STEINER, TSUDIK AND WAIDNER THREE-PARTY EKE 271 7.5
RSA-BASED PROTOCOLS 273 7.5.1 RSA-BASED EKE 273 7.5.2 OKE AND SNAPI 274
7.6 PROTOCOLS USING A SERVER PUBLIC KEY 276 7.6.1 GLNS PROTOCOLS WITH
SERVER PUBLIC KEYS 277 7.6.2 KWON-SONG PROTOCOLS 278 7.6.3
HALEVI-KRAWCZYK PROTOCOLS 279 7.6.4 THREE-PARTY PROTOCOL OF YEN AND LIU
280 7.7 OTHER PROTOCOLS 282 7.7.1 LEE-SOHN-YANG-WON PROTOCOL 282 7.7.2
ANDERSON-LOMAS PROTOCOL 283 7.7.3 STRENGTHENING PASSWORDS 284 7.8
CONCLUSION 285 A STANDARDS FOR AUTHENTICATION AND KEY ESTABLISHMENT 289
A.I ISOSTANDARDS 289 A.I.I. ISO/IEC 9798 289 A.1.2 ISO/IEC 11770 290
A.1.3 ISO 9594-8/ITU X.509 290 A.2 OTHER STANDARDS 290 A.2.1 IETF
STANDARDS 290 A.2.2 IEEE P1363-2000 291 A.2.3 NIST AND ANSI STANDARDS
291 B SUMMARY OF NOTATION 293 REFERENCES 295 INDEX OF PROTOCOLS 317
GENERAL INDEX 319
|
any_adam_object | 1 |
author | Boyd, Colin 1959- Mathuria, Anish |
author_GND | (DE-588)1036721086 |
author_facet | Boyd, Colin 1959- Mathuria, Anish |
author_role | aut aut |
author_sort | Boyd, Colin 1959- |
author_variant | c b cb a m am |
building | Verbundindex |
bvnumber | BV017515092 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
classification_tum | DAT 252f DAT 465f |
ctrlnum | (OCoLC)248732913 (DE-599)BVBBV017515092 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02117nam a2200517 c 4500</leader><controlfield tag="001">BV017515092</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140207 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030916s2003 gw d||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">968658024</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540431071</subfield><subfield code="9">3-540-43107-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248732913</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017515092</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Boyd, Colin</subfield><subfield code="d">1959-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1036721086</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protocols for authentication and key establishment</subfield><subfield code="b">with 31 tables</subfield><subfield code="c">Colin Boyd ; Anish Mathuria</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 321 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security and cryptography</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 295 - 316</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Diffie-Hellman-Algorithmus</subfield><subfield code="0">(DE-588)4739863-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Diffie-Hellman-Algorithmus</subfield><subfield code="0">(DE-588)4739863-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mathuria, Anish</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch Darmstadt</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010548008&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010548008</subfield></datafield></record></collection> |
id | DE-604.BV017515092 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:18:54Z |
institution | BVB |
isbn | 3540431071 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010548008 |
oclc_num | 248732913 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-824 DE-M347 DE-92 DE-384 DE-522 DE-634 DE-11 |
owner_facet | DE-91G DE-BY-TUM DE-824 DE-M347 DE-92 DE-384 DE-522 DE-634 DE-11 |
physical | XXIV, 321 S. graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer |
record_format | marc |
series2 | Information security and cryptography |
spelling | Boyd, Colin 1959- Verfasser (DE-588)1036721086 aut Protocols for authentication and key establishment with 31 tables Colin Boyd ; Anish Mathuria Berlin [u.a.] Springer 2003 XXIV, 321 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Information security and cryptography Literaturverz. S. 295 - 316 Authentifikation (DE-588)4330656-1 gnd rswk-swf Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Authentifikation (DE-588)4330656-1 s Schlüsselverwaltung (DE-588)4625230-7 s Kommunikationsprotokoll (DE-588)4128252-8 s Datensicherung (DE-588)4011144-1 s Diffie-Hellman-Algorithmus (DE-588)4739863-2 s DE-604 Mathuria, Anish Verfasser aut HEBIS Datenaustausch Darmstadt application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010548008&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Boyd, Colin 1959- Mathuria, Anish Protocols for authentication and key establishment with 31 tables Authentifikation (DE-588)4330656-1 gnd Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd Datensicherung (DE-588)4011144-1 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
subject_GND | (DE-588)4330656-1 (DE-588)4739863-2 (DE-588)4011144-1 (DE-588)4625230-7 (DE-588)4128252-8 |
title | Protocols for authentication and key establishment with 31 tables |
title_auth | Protocols for authentication and key establishment with 31 tables |
title_exact_search | Protocols for authentication and key establishment with 31 tables |
title_full | Protocols for authentication and key establishment with 31 tables Colin Boyd ; Anish Mathuria |
title_fullStr | Protocols for authentication and key establishment with 31 tables Colin Boyd ; Anish Mathuria |
title_full_unstemmed | Protocols for authentication and key establishment with 31 tables Colin Boyd ; Anish Mathuria |
title_short | Protocols for authentication and key establishment |
title_sort | protocols for authentication and key establishment with 31 tables |
title_sub | with 31 tables |
topic | Authentifikation (DE-588)4330656-1 gnd Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd Datensicherung (DE-588)4011144-1 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
topic_facet | Authentifikation Diffie-Hellman-Algorithmus Datensicherung Schlüsselverwaltung Kommunikationsprotokoll |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010548008&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT boydcolin protocolsforauthenticationandkeyestablishmentwith31tables AT mathuriaanish protocolsforauthenticationandkeyestablishmentwith31tables |