Secure Key Establishment (E-BOOK) Sushil Jajodia
- Boston, MA : Springer-Verlag US, 2009.
- v.: digital
- Advances in Information Security, 41 .
Introduction (Page-1) Background Materials (Page-19) A Flawed BR95 Partnership Function (Page-57) On The Key Sharing Requirement (Page-71) Comparison of Bellare–Rogaway and Canetti–Krawczyk Models (Page-83) An Extension to the Bellare–Rogaway Model (Page-101) A Proof of Revised Yahalom Protocol (Page-117) On Session Key Construction (Page-147) Complementing Computational Protocol Analysis (Page-163) An Integrative Framework to Protocol Analysis and Repair (Page-191) Conclusion and Future Work (Page-205)