Protocols for authentication and key establishment
Saved in:
Main Author: | Boyd, Colin |
---|---|
Other Authors: | Mathuria, Anish 1967- |
Format: | Unknown |
Published: |
Berlin New York
Springer
2003.
|
Series: | Information security and cryptography
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Introduction to identity-based encryption
by: Martin, Luther
Published: (2008) -
Cryptography and network security
by: Stallings, William
Published: (2003) -
Understanding PKI concepts, standards, and deployment considerations
by: Adams, Carlisle 1961-
Published: (2003) -
Security of Information and Communication Networks
by: Kartalopoulos, Stamatios V.
Published: (2009) -
PKI security solutions for the enterprise solving HIPPA, E-paper act, and other compliance issues
by: Raina, Kapil
Published: (2003)