Nehodí sa? Žiadny problém! U nás môžete do 30 dní vrátiť
S darčekovým poukazom nešliapnete vedľa. Obdarovaný si za darčekový poukaz môže vybrať čokoľvek z našej ponuky.
30 dní na vrátenie tovaru
This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. The book is a suitable graduate-level introduction, and reference for researchers and practitioners. In this new edition the authors introduce chapters on computational models for key exchange and authentication, key agreement, the TLS protocol, ID-based protocols, and group key exchange, and throughout the book they report on new developments and updated standards.