Text
Protocols for authentication and key establishment
Table of contents:
1. A Tutorial Introduction to Authentication and Key Establishment
2. Goals for Authentication and Key Establishment
3. Protocols Using Shared Key Cryptography
4. Authentication and Key Transport Using Public Key Cryptography
5. Key Agreement Protocols
6. Conference Key Protocols
7. Password-Based Protocols
A. Standards for Authentication and Key Establishment
B. Summary of Notation.
No other version available