We strive to deliver the best value to our customers and ensure complete satisfaction for all our textbook rentals.
You can return your online books for any reason within our refund period – no questions asked.
Every order is available for express shipping, and return shipping is always free.
You'll be happy with the quality of your books (or we'll ship you another one on our dime).
You can extend your rental up to 14 days – at the same cheap daily rental rate.
If you decide to keep the book it will never cost more than the purchase price.
As always, you have access to over 5 million titles. Plus, you can choose from 5 rental periods, so you only pay for what you’ll use. And if you ever run into trouble, our top-notch U.S. based Customer Service team is ready to help by email, chat or phone.
Supplemental materials are not guaranteed for used textbooks or rentals (access codes, DVDs, workbooks).
AUTHENTICATION PROTOCOLS: CRYPTANALYSIS OF PASSWORD BASED AUTHENTICATION AND KEY AGREEMENT PROTOCOLS
by:Dr Sandeep Kumar Sood
In single password based anti-phishing protocol, client can use single password for different online accounts and that password can not be detected by any of the malicious servers or the attacker. Proposed cookies based and an inverse cookie based virtual password authentication protocols are very effective to thwart online dictionary attacks ...
In single password based anti-phishing protocol, client can use single password for different online accounts and that password can not be detected by any of the malicious servers or the attacker. Proposed cookies based and an inverse cookie based virtual password authentication protocols are very effective to thwart online dictionary attacks because the computation cost of login on to the web server increases exponentially with each login failure for an attacker. We proposed an efficient SSO password based two-server architecture in which the user has to login once to get a valid ticket. Improvements to several static and dynamic identity based authentication protocols have also been suggested. The proposed dynamic identity based authentication protocols aim to provide the privacy to the user's identity so that users are anonymous in communication channel. Also the concept of two- tier authentication for the client makes it difficult for an attacker to guess out the information pertaining to password and ticket. The work presented in this book is a step toward making e-commerce transactions more reliable and secure.
Since launching the first textbook rental site in 2006, BookRenter has never wavered from our mission to make education more affordable for all students. Every day, we focus on delivering students the best prices, the most flexible options, and the best service on earth. On March 13, 2012 BookRenter.com, Inc. formally changed its name to Rafter, Inc. We are still the same company and the same people, only our corporate name has changed.