|
![]() |
|||
|
||||
OverviewThis book is based on a course on the state of the art of computer security and industrial cryptography held at the Katholieke Universiteit Leuven, Belgium in June 1997. The 19 revised full presentations included in the book are developed from lectures given during the course. The areas covered range from theoretical prerequisites and recent technical developments to standardization issues and real-world applications. Among the topics addressed are cryptographic primitives, block ciphers, authentication, cryptographic algorithms, public-key crypto systems, key management, network security, Internet security protocols, key escrow, smart cart security, digital cash, systems security, security management, and IT security standardization. Full Product DetailsAuthor: Bart Preneel , Vincent RijmenPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 1998 ed. Volume: 1528 Dimensions: Width: 15.50cm , Height: 2.10cm , Length: 23.30cm Weight: 1.270kg ISBN: 9783540654742ISBN 10: 3540654747 Pages: 400 Publication Date: 18 December 1998 Audience: College/higher education , General/trade , Professional and scholarly , Postgraduate, Research & Scholarly , General Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsTrends in the Fight Against Computer-Related Delinquency.- Block Ciphers -A Survey.- Cryptographic Primitives for Information Authentication - State of the Art.- Recent Developments in the Design of Conventional Cryptographic Algorithms.- Elliptic Curve Public-Key Cryptosystems - An Introduction.- Key Management Techniques.- Security of Computer Networks.- Internet Security Protocols.- Securing Internet Electronic Mail.- GSM: Security, Services, and the SIM.- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View.- Management of Secret Keys: Dynamic Key Handling.- On Solutions to the Key Escrow Problem.- Smart Cards - Requirements, Properties, and Applications.- Smart Card Security `How Can We Be So Sure?'.- Security Aspects of the Ecash (TM) Payment System.- International Standardisation of IT Security.- Security Management - The Process.- to Computer Security.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |