State of the Art in Applied Cryptography Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures /
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial eve...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
1998.
|
Edition: | 1st ed. 1998. |
Series: | Lecture Notes in Computer Science,
1528 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Trends in the Fight Against Computer-Related Delinquency
- Block Ciphers -A Survey
- Cryptographic Primitives for Information Authentication - State of the Art
- Recent Developments in the Design of Conventional Cryptographic Algorithms
- Elliptic Curve Public-Key Cryptosystems - An Introduction
- Key Management Techniques
- Security of Computer Networks
- Internet Security Protocols
- Securing Internet Electronic Mail
- GSM: Security, Services, and the SIM
- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View
- Management of Secret Keys: Dynamic Key Handling
- On Solutions to the Key Escrow Problem
- Smart Cards - Requirements, Properties, and Applications
- Smart Card Security 'How Can We Be So Sure?'
- Security Aspects of the Ecash™ Payment System
- International Standardisation of IT Security
- Security Management - The Process
- to Computer Security.