このページのリンク

<電子ブック>
Computer Security and Industrial Cryptography : State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 / edited by Bart Preneel, Rene Govaerts, Joos Vandewalle
(Lecture Notes in Computer Science. ISSN:16113349 ; 741)

1st ed. 1993.
出版者 (Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer)
出版年 1993
本文言語 英語
大きさ VIII, 284 p : online resource
著者標目 Preneel, Bart editor
Govaerts, Rene editor
Vandewalle, Joos editor
SpringerLink (Online service)
件 名 LCSH:Cryptography
LCSH:Data encryption (Computer science)
LCSH:Data protection
LCSH:Computer science
LCSH:Computer networks 
LCSH:Operating systems (Computers)
LCSH:Discrete mathematics
FREE:Cryptology
FREE:Data and Information Security
FREE:Theory of Computation
FREE:Computer Communication Networks
FREE:Operating Systems
FREE:Discrete Mathematics
一般注記 Trends in the fight against computer-related delinquency -- Technical approaches to Thwart computer fraud -- Public key cryptography -- Better login protocols for computer networks -- Secret-key exchange with authentication -- Information authentication: Hash functions and digital signatures -- Key management -- Evaluation criteria for it security -- Standardization of cryptographic techniques -- Numbers can be a better form of cash than paper -- ISO-OSI security architecture -- Security aspects of mobile communications -- (Local area) network security -- Cryptography within phase I of the EEC-RACE programme -- EDI security -- AXYTRANS: physical funds transport and DES -- Unix security & Kerberos
This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES)
HTTP:URL=https://doi.org/10.1007/3-540-57341-0
目次/あらすじ

所蔵情報を非表示

電子ブック オンライン 電子ブック

Springer eBooks 9783540480747
電子リソース
EB00225409

書誌詳細を非表示

データ種別 電子ブック
分 類 LCC:QA268
DC23:005.824
書誌ID 4001090183
ISBN 9783540480747

 類似資料