LEADER 04670nam 22007575 450 001 996466056103316 005 20200629213230.0 010 $a3-540-48074-9 024 7 $a10.1007/3-540-57341-0 035 $a(CKB)1000000000234040 035 $a(SSID)ssj0000322141 035 $a(PQKBManifestationID)11277756 035 $a(PQKBTitleCode)TC0000322141 035 $a(PQKBWorkID)10281437 035 $a(PQKB)11665591 035 $a(DE-He213)978-3-540-48074-7 035 $a(PPN)155217925 035 $a(EXLCZ)991000000000234040 100 $a20121227d1993 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security and Industrial Cryptography$b[electronic resource] $eState of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 /$fedited by Bart Preneel, Rene Govaerts, Joos Vandewalle 205 $a1st ed. 1993. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1993. 215 $a1 online resource (VIII, 284 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v741 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-57341-0 327 $aTrends in the fight against computer-related delinquency -- Technical approaches to Thwart computer fraud -- Public key cryptography -- Better login protocols for computer networks -- Secret-key exchange with authentication -- Information authentication: Hash functions and digital signatures -- Key management -- Evaluation criteria for it security -- Standardization of cryptographic techniques -- Numbers can be a better form of cash than paper -- ISO-OSI security architecture -- Security aspects of mobile communications -- (Local area) network security -- Cryptography within phase I of the EEC-RACE programme -- EDI security -- AXYTRANS: physical funds transport and DES -- Unix security & Kerberos. 330 $aThis volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES). 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v741 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aCombinatorics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aCombinatorics$3https://scigraph.springernature.com/ontologies/product-market-codes/M29010 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers. 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aCombinatorics. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aTheory of Computation. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aCombinatorics. 676 $a005.82 702 $aPreneel$b Bart$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGovaerts$b Rene$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVandewalle$b Joos$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466056103316 996 $aComputer security and industrial cryptography$91501936 997 $aUNISA