Computer Security and Industrial Cryptography
State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991
Seiten
1993
|
1993
Springer Berlin (Verlag)
978-3-540-57341-8 (ISBN)
Springer Berlin (Verlag)
978-3-540-57341-8 (ISBN)
This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer security and cryptography and for practitionersin industry and government.The contributors of the 1991 course were invited to submitrevised and updated versions of their papers for inclusionin a book. This volume is the final result; it is well-balanced between basic theory and real life applications,between mathematical background and juridical aspects, andbetween technical developments and standardization issues.Some of the topics are public key cryptography, hashfunctions, secure protocols, digital signatures, securityarchitectures, network security, and data encryptionstandards (DES).
Trends in the fight against computer-related delinquency.- Technical approaches to Thwart computer fraud.- Public key cryptography.- Better login protocols for computer networks.- Secret-key exchange with authentication.- Information authentication: Hash functions and digital signatures.- Key management.- Evaluation criteria for it security.- Standardization of cryptographic techniques.- Numbers can be a better form of cash than paper.- ISO-OSI security architecture.- Security aspects of mobile communications.- (Local area) network security.- Cryptography within phase I of the EEC-RACE programme.- EDI security.- AXYTRANS: physical funds transport and DES.- Unix security & Kerberos.
Erscheint lt. Verlag | 28.10.1993 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | VIII, 284 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 216 x 279 mm |
Gewicht | 445 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | combinatorics • Computer • Computer Security • Computersicherheit • Cryptographic Techniques • cryptography • data encryption • Data Security • Datensicherheit • Kryptographie • Kryptographische Techniken • Public Key Crypto Systems • Public-Key Kryptosysteme |
ISBN-10 | 3-540-57341-0 / 3540573410 |
ISBN-13 | 978-3-540-57341-8 / 9783540573418 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €