Computer Security and Industrial Cryptography [electronic resource] : State of the Art and Evolution ESAT Course, Leuven, Belgium, May 21–23, 1991 / edited by Bart Preneel, René Govaerts, Joos Vandewalle.

By: Preneel, Bart [editor.]Contributor(s): Govaerts, René [editor.] | Vandewalle, Joos [editor.] | SpringerLink (Online service)Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science: 741Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1993Description: VIII, 284 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540480747Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Coding theory | Combinatorics | Computer Science | Computer Communication Networks | Operating Systems | Combinatorics | Data Encryption | Coding and Information TheoryAdditional physical formats: Printed edition:: No titleDDC classification: 004.6 LOC classification: TK5105.5-5105.9Online resources: Click here to access online
Contents:
Trends in the fight against computer-related delinquency -- Technical approaches to Thwart computer fraud -- Public key cryptography -- Better login protocols for computer networks -- Secret-key exchange with authentication -- Information authentication: Hash functions and digital signatures -- Key management -- Evaluation criteria for it security -- Standardization of cryptographic techniques -- Numbers can be a better form of cash than paper -- ISO-OSI security architecture -- Security aspects of mobile communications -- (Local area) network security -- Cryptography within phase I of the EEC-RACE programme -- EDI security -- AXYTRANS: physical funds transport and DES -- Unix security & Kerberos.
In: Springer eBooksSummary: This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Trends in the fight against computer-related delinquency -- Technical approaches to Thwart computer fraud -- Public key cryptography -- Better login protocols for computer networks -- Secret-key exchange with authentication -- Information authentication: Hash functions and digital signatures -- Key management -- Evaluation criteria for it security -- Standardization of cryptographic techniques -- Numbers can be a better form of cash than paper -- ISO-OSI security architecture -- Security aspects of mobile communications -- (Local area) network security -- Cryptography within phase I of the EEC-RACE programme -- EDI security -- AXYTRANS: physical funds transport and DES -- Unix security & Kerberos.

This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).

There are no comments on this title.

to post a comment.

Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha