New book co-authored by Combinatorics and Optimization professor

Thursday, November 7, 2019

"", written by Colin Boyd, Anish Mathuria and C&O Professor Douglas Stebila, is the latest title in Springer's series on .

"This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. Learn more about this book.