Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991
This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure prools, digital signatures, security architectures, network security, and data encryption standards (DES).
1111357794
Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991
This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure prools, digital signatures, security architectures, network security, and data encryption standards (DES).
54.99 In Stock
Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991

Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991

Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991

Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991

Paperback(1993)

$54.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure prools, digital signatures, security architectures, network security, and data encryption standards (DES).

Product Details

ISBN-13: 9783540573418
Publisher: Springer Berlin Heidelberg
Publication date: 12/02/1993
Series: Lecture Notes in Computer Science , #741
Edition description: 1993
Pages: 284
Product dimensions: 8.50(w) x 10.98(h) x 0.02(d)

Table of Contents

Trends in the fight against computer-related delinquency.- Technical approaches to Thwart computer fraud.- Public key cryptography.- Better login prools for computer networks.- Secret-key exchange with authentication.- Information authentication: Hash functions and digital signatures.- Key management.- Evaluation criteria for it security.- Standardization of cryptographic techniques.- Numbers can be a better form of cash than paper.- ISO-OSI security architecture.- Security aspects of mobile communications.- (Local area) network security.- Cryptography within phase I of the EEC-RACE programme.- EDI security.- AXYTRANS: physical funds transport and DES.- Unix security & Kerberos.
From the B&N Reads Blog

Customer Reviews