Authentication and Key Agreement Protocols

CHF 61.90
Auf Lager
SKU
SAKJ7BE8C6P
Stock 1 Verfügbar
Geliefert zwischen Fr., 28.11.2025 und Mo., 01.12.2025

Details

Authentication is an important security service.
Sometimes, key agreement is also included in the
authentication scheme. Until now, several
authentication protocols, and authentication and key
agreement protocols have been proposed. These
protocols range from complex public-key
cryptosystems to simple hash-based password
authentication schemes. Recently, preserving the
user anonymity during an authentication process has
gained a great deal of attention. In this
dissertation, we first provide an overview of
various authentication schemes and survey the
existing literature. We then present four new
authentication protocols: two of which are elliptic
curve cryptography-based authentication and key
agreement protocols; the third is a simple hash-
based password authentication protocol; and finally,
there is an RSA-based identification and key
agreement protocol. Compared to other protocols, our
protocols are not only secure and efficient, but
also preserve anonymity during the authentication
process.

Autorentext
Dr. Kumar Mangipudi obtained his PhD in Electrical & Computer engineering from North Dakota State University, Fargo, ND, USA in 2006. Since then he works at Intel Corporation, Hillsboro, OR, USA as a Security Evaluation Engineer. His interests are in Design for Security, Secure Coding, Penetration Testing, Network Security and Cryptography.

Klappentext
Authentication is an important security service. Sometimes, key agreement is also included in the authentication scheme. Until now, several authentication protocols, and authentication and key agreement protocols have been proposed. These protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. Recently, preserving the user anonymity during an authentication process has gained a great deal of attention. In this dissertation, we first provide an overview of various authentication schemes and survey the existing literature. We then present four new authentication protocols: two of which are elliptic curve cryptography-based authentication and key agreement protocols; the third is a simple hash- based password authentication protocol; and finally, there is an RSA-based identification and key agreement protocol. Compared to other protocols, our protocols are not only secure and efficient, but also preserve anonymity during the authentication process.

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09783639093285
    • Sprache Deutsch
    • Größe H220mm x B220mm
    • Jahr 2013
    • EAN 9783639093285
    • Format Kartonierter Einband (Kt)
    • ISBN 978-3-639-09328-5
    • Titel Authentication and Key Agreement Protocols
    • Autor Kumar Mangipudi
    • Untertitel Cryptanlysis and Design
    • Herausgeber VDM Verlag Dr. Müller e.K.
    • Anzahl Seiten 96
    • Genre Informatik

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.
Made with ♥ in Switzerland | ©2025 Avento by Gametime AG
Gametime AG | Hohlstrasse 216 | 8004 Zürich | Schweiz | UID: CHE-112.967.470