Besplatna dostava Overseas kurirskom službom iznad 59.99 €
Overseas 4.99 Pošta 4.99 DPD 5.99 GLS 3.99 GLS paketomat 3.49 Box Now 4.49

Besplatna dostava putem Box Now paketomata i Overseas kurirske službe iznad 59,99 €!

Protocols for Authentication and Key Establishment

Jezik EngleskiEngleski
Knjiga Tvrdi uvez
Knjiga Protocols for Authentication and Key Establishment Colin Boyd
Libristo kod: 01564038
Nakladnici Springer, Berlin, studeni 2002
Protocols for authentication and key establishment are the foundation for security of communications... Cijeli opis
? points 304 b
121.04
Vanjske zalihe u manjem broju Šaljemo za 13-16 dana

30 dana za povrat kupljenih proizvoda


Moglo bi vas zanimati i


Tělo pro smrt a pro slávu Olivier Clément / binding.
common.buy 5.03
Calvin und Hobbes - Wir wandern aus! Bill Watterson / Meki uvez
common.buy 12.20
SPS-Beispiele mit Simatic S7 Jürgen Kaftan / Tvrdi uvez
common.buy 29.35
COUSIN DEBORAH'S WHIM V3: A TALE MARY E. SHIPLEY / Meki uvez
common.buy 29.65
Little Book of Maths Problem-Solving Judith Dancer / Meki uvez
common.buy 15.02
Mit Bildern lernen Rita Burrichter / Tvrdi uvez
common.buy 22.49
Grundlagen Naturnaher Gewassergestaltung Klaus Kern / Meki uvez
common.buy 77.67
PRIPREMAMO
Stone's Throw from Ellis Island Thomas J. Espenshade / Tvrdi uvez
common.buy 97.54
History of Tibet Alex McKay / Tvrdi uvez
common.buy 1 555.72
Morality and Behaviour in Democratic Athens Gabriel Herman / Tvrdi uvez
common.buy 165.23

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Poklonite ovu knjigu još danas
To je jednostavno
1 Dodajte knjigu u košaricu i odaberite isporuku kao poklon 2 Zauzvrat ćemo vam poslati kupon 3 Knjiga dolazi na adresu poklonoprimca

Prijava

Prijavite se na svoj račun. Još nemate Libristo račun? Otvorite ga odmah!

 
obvezno
obvezno

Nemate račun? Ostvarite pogodnosti uz Libristo račun!

Sve ćete imati pod kontrolom uz Libristo račun.

Otvoriti Libristo račun