Full Description
Presents a comprehensive and integrated treatment of key establishment protocols. This book is aimed mainly at researchers and security professionals, but it will also be suitable as a supplementary text for graduate students and advanced undergraduates.



