State of the Art in Applied Cryptography [electronic resource] : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures.

The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing.

Saved in:
Bibliographic Details
Main Author: SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 1998
Subjects:Computer science., Information technology., Business, Computer communication systems., Operating systems (Computers)., Computer security., Data encryption (Computer science)., Management information systems., Computer Science., Systems and Data Security., Data Encryption., Management of Computing and Information Systems., Operating Systems., Computer Communication Networks., IT in Business.,
Online Access:http://dx.doi.org/10.1007/3-540-49248-8
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:185703
record_format koha
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Information technology.
Business
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Operating Systems.
Computer Communication Networks.
IT in Business.
Computer science.
Information technology.
Business
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Operating Systems.
Computer Communication Networks.
IT in Business.
spellingShingle Computer science.
Information technology.
Business
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Operating Systems.
Computer Communication Networks.
IT in Business.
Computer science.
Information technology.
Business
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Operating Systems.
Computer Communication Networks.
IT in Business.
SpringerLink (Online service)
State of the Art in Applied Cryptography [electronic resource] : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures.
description The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing.
format Texto
topic_facet Computer science.
Information technology.
Business
Computer communication systems.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Management information systems.
Computer Science.
Systems and Data Security.
Data Encryption.
Management of Computing and Information Systems.
Operating Systems.
Computer Communication Networks.
IT in Business.
author SpringerLink (Online service)
author_facet SpringerLink (Online service)
author_sort SpringerLink (Online service)
title State of the Art in Applied Cryptography [electronic resource] : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures.
title_short State of the Art in Applied Cryptography [electronic resource] : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures.
title_full State of the Art in Applied Cryptography [electronic resource] : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures.
title_fullStr State of the Art in Applied Cryptography [electronic resource] : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures.
title_full_unstemmed State of the Art in Applied Cryptography [electronic resource] : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures.
title_sort state of the art in applied cryptography [electronic resource] : course on computer security and industrial cryptography leuven, belgium, june 3–6, 1997 revised lectures.
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 1998
url http://dx.doi.org/10.1007/3-540-49248-8
work_keys_str_mv AT springerlinkonlineservice stateoftheartinappliedcryptographyelectronicresourcecourseoncomputersecurityandindustrialcryptographyleuvenbelgiumjune361997revisedlectures
_version_ 1756265408815431680
spelling KOHA-OAI-TEST:1857032018-07-30T23:08:18ZState of the Art in Applied Cryptography [electronic resource] : Course on Computer Security and Industrial Cryptography Leuven, Belgium, June 3–6, 1997 Revised Lectures. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,1998.engThe Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing.Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey -- Cryptographic Primitives for Information Authentication — State of the Art -- Recent Developments in the Design of Conventional Cryptographic Algorithms -- Elliptic Curve Public-Key Cryptosystems — An Introduction -- Key Management Techniques -- Security of Computer Networks -- Internet Security Protocols -- Securing Internet Electronic Mail -- GSM: Security, Services, and the SIM -- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View -- Management of Secret Keys: Dynamic Key Handling -- On Solutions to the Key Escrow Problem -- Smart Cards — Requirements, Properties, and Applications -- Smart Card Security ‘How Can We Be So Sure?’ -- Security Aspects of the Ecash™ Payment System -- International Standardisation of IT Security -- Security Management — The Process -- to Computer Security.The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing.Computer science.Information technology.BusinessComputer communication systems.Operating systems (Computers).Computer security.Data encryption (Computer science).Management information systems.Computer Science.Systems and Data Security.Data Encryption.Management of Computing and Information Systems.Operating Systems.Computer Communication Networks.IT in Business.Springer eBookshttp://dx.doi.org/10.1007/3-540-49248-8URN:ISBN:9783540492481