Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 by Bart PreneelComputer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 by Bart Preneel

Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven…

EditorBart Preneel, Rene Govaerts, Joos Vandewalle

Paperback | October 28, 1993

Pricing and Purchase Info

$73.47 online 
$77.95 list price save 5%
Earn 367 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer security and cryptography and for practitionersin industry and government.The contributors of the 1991 course were invited to submitrevised and updated versions of their papers for inclusionin a book. This volume is the final result; it is well-balanced between basic theory and real life applications,between mathematical background and juridical aspects, andbetween technical developments and standardization issues.Some of the topics are public key cryptography, hashfunctions, secure protocols, digital signatures, securityarchitectures, network security, and data encryptionstandards (DES).
Title:Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven…Format:PaperbackDimensions:288 pagesPublished:October 28, 1993Publisher:Springer Berlin HeidelbergLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540573410

ISBN - 13:9783540573418

Reviews

Table of Contents

Trends in the fight against computer-related delinquency.- Technical approaches to Thwart computer fraud.- Public key cryptography.- Better login protocols for computer networks.- Secret-key exchange with authentication.- Information authentication: Hash functions and digital signatures.- Key management.- Evaluation criteria for it security.- Standardization of cryptographic techniques.- Numbers can be a better form of cash than paper.- ISO-OSI security architecture.- Security aspects of mobile communications.- (Local area) network security.- Cryptography within phase I of the EEC-RACE programme.- EDI security.- AXYTRANS: physical funds transport and DES.- Unix security & Kerberos.