This is the first comprehensive and integrated treatment of key establishment protocols. It is aimed mainly at researchers and security professionals, although it will also be suitable as a supplementary text for graduate students and advanced undergraduates.
From the reviews:
"This book is the first comprehensive treatment of protocols for authentication and key establishment. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols that have been broken in the literature. In addition to a clear and uniform presentation of the protocols, this book includes a description of all the main attack types ? . will prove useful both to those who wish to learn more about the field and as a reference ? ." (Nikolay Yakovlevich Tikhonenko, Zentralblatt MATH, Vol. 1043 (18), 2004)