Any business or financial transaction over an unsecured network demands some level of trust between the communicating parties. Establishment of a key through cryptographic mechanism becomes crucial when they must be able to authenticate each other in the absence of any prior association. Certificate based Public Key Infrastructure (PKI) has been the source of many radical advances in the evolution of security solutions to provide: authentication, authorization, confidentiality, integrity and accountability. The book presents a new trusted server based key establishment protocol, AK-protocol that makes use of Certificate-based authentication. An analysis and resilience of AK-protocol for various properties that a key establishment protocol must exhibit, along with practical scenarios when under different attack situations like Replay, Impersonation, DDoS attacks, etc., is demonstrated. A proof-of-concept on the practical implementation of AK-Protocol in financial domains while integrating it with 3-D secure protocol is also envisaged.
"Sinopsis" puede pertenecer a otra edición de este libro.
Any business or financial transaction over an unsecured network demands some level of trust between the communicating parties. Establishment of a key through cryptographic mechanism becomes crucial when they must be able to authenticate each other in the absence of any prior association. Certificate based Public Key Infrastructure (PKI) has been the source of many radical advances in the evolution of security solutions to provide: authentication, authorization, confidentiality, integrity and accountability. The book presents a new trusted server based key establishment protocol, AK-protocol that makes use of Certificate-based authentication. An analysis and resilience of AK-protocol for various properties that a key establishment protocol must exhibit, along with practical scenarios when under different attack situations like Replay, Impersonation, DDoS attacks, etc., is demonstrated. A proof-of-concept on the practical implementation of AK-Protocol in financial domains while integrating it with 3-D secure protocol is also envisaged.
Astha Keshariya, PHD, MCA [Hons] has consulted several commercial and academic organizations in the field of applied Cryptography and Information Security. She has worked on many projects like implementation of algorithms like RSA for financial transactions, mitigations of DDOS attacks and optimizing the cryptographic modes of operations.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 28,90 gastos de envío desde Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envíoEUR 23,00 gastos de envío desde Alemania a Estados Unidos de America
Destinos, gastos y plazos de envíoLibrería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Any business or financial transaction over an unsecured network demands some level of trust between the communicating parties. Establishment of a key through cryptographic mechanism becomes crucial when they must be able to authenticate each other in the absence of any prior association. Certificate based Public Key Infrastructure (PKI) has been the source of many radical advances in the evolution of security solutions to provide: authentication, authorization, confidentiality, integrity and accountability. The book presents a new trusted server based key establishment protocol, AK-protocol that makes use of Certificate-based authentication. An analysis and resilience of AK-protocol for various properties that a key establishment protocol must exhibit, along with practical scenarios when under different attack situations like Replay, Impersonation, DDoS attacks, etc., is demonstrated. A proof-of-concept on the practical implementation of AK-Protocol in financial domains while integrating it with 3-D secure protocol is also envisaged. 180 pp. Englisch. Nº de ref. del artículo: 9783659216121
Cantidad disponible: 2 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Keshariya AsthaAstha Keshariya, PHD, MCA [Hons] has consulted several commercial and academic organizations in the field of applied Cryptography and Information Security. She has worked on many projects like implementation of algorit. Nº de ref. del artículo: 5140398
Cantidad disponible: Más de 20 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -Any business or financial transaction over an unsecured network demands some level of trust between the communicating parties. Establishment of a key through cryptographic mechanism becomes crucial when they must be able to authenticate each other in the absence of any prior association. Certificate based Public Key Infrastructure (PKI) has been the source of many radical advances in the evolution of security solutions to provide: authentication, authorization, confidentiality, integrity and accountability. The book presents a new trusted server based key establishment protocol, AK-protocol that makes use of Certificate-based authentication. An analysis and resilience of AK-protocol for various properties that a key establishment protocol must exhibit, along with practical scenarios when under different attack situations like Replay, Impersonation, DDoS attacks, etc., is demonstrated. A proof-of-concept on the practical implementation of AK-Protocol in financial domains while integrating it with 3-D secure protocol is also envisaged.Books on Demand GmbH, Überseering 33, 22297 Hamburg 180 pp. Englisch. Nº de ref. del artículo: 9783659216121
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Any business or financial transaction over an unsecured network demands some level of trust between the communicating parties. Establishment of a key through cryptographic mechanism becomes crucial when they must be able to authenticate each other in the absence of any prior association. Certificate based Public Key Infrastructure (PKI) has been the source of many radical advances in the evolution of security solutions to provide: authentication, authorization, confidentiality, integrity and accountability. The book presents a new trusted server based key establishment protocol, AK-protocol that makes use of Certificate-based authentication. An analysis and resilience of AK-protocol for various properties that a key establishment protocol must exhibit, along with practical scenarios when under different attack situations like Replay, Impersonation, DDoS attacks, etc., is demonstrated. A proof-of-concept on the practical implementation of AK-Protocol in financial domains while integrating it with 3-D secure protocol is also envisaged. Nº de ref. del artículo: 9783659216121
Cantidad disponible: 1 disponibles
Librería: Mispah books, Redhill, SURRE, Reino Unido
Paperback. Condición: Like New. Like New. book. Nº de ref. del artículo: ERICA79636592161276
Cantidad disponible: 1 disponibles