000 01025 a2200205 4500
003 Nust
005 20170207165828.0
020 _a9780387879697
040 _cNust
082 _a005.8
100 _aSushil Jajodia
110 2 _aChoo.
245 1 0 _aSecure Key Establishment (E-BOOK)
_hSushil Jajodia
_c.
260 _aBoston, MA :
_bSpringer-Verlag US,
_c2009.
300 _bv.: digital
440 0 _aAdvances in Information Security,
_v41
505 _aIntroduction (Page-1) Background Materials (Page-19) A Flawed BR95 Partnership Function (Page-57) On The Key Sharing Requirement (Page-71) Comparison of Bellare–Rogaway and Canetti–Krawczyk Models (Page-83) An Extension to the Bellare–Rogaway Model (Page-101) A Proof of Revised Yahalom Protocol (Page-117) On Session Key Construction (Page-147) Complementing Computational Protocol Analysis (Page-163) An Integrative Framework to Protocol Analysis and Repair (Page-191) Conclusion and Future Work (Page-205)
650 1 4 _aComputer Science
651 _aE-Book
942 _2ddc
_cBK
999 _c213173
_d213173