default search action
Computer Security and Industrial Cryptography 1991: Leuven, Belgium
- Bart Preneel, René Govaerts, Joos Vandewalle:
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, Leuven, Belgium, May 21-23, 1991. Lecture Notes in Computer Science 741, Springer 1993, ISBN 3-540-57341-0
Introduction
- Bart De Schutter:
Trends in the Fight Against Computer-Related Delinquency. 3-19 - Joos Vandewalle, René Govaerts, Bart Preneel:
Technical Approaches to Thwart Computer Fraud. 20-30
Theory
- Marijke De Soete:
Public Key Cryptography. 33-49 - Dominique de Waleffe, Jean-Jacques Quisquater:
Better Login Protocols for Computer Networks. 50-70 - Johan van Tilburg:
Secret-Key Exchange with Authentication. 71-86 - Bart Preneel, René Govaerts, Joos Vandewalle:
Information Authentication: Hash Functions and Digital Signatures. 87-131 - Walter Fumy:
Key Management. 132-147
Applications
- David W. Roberts:
Evaluation Criteria for IT Security. 151-161 - Bart Preneel:
Standardization of Cryptographic Techniques. 162-173 - David Chaum:
Numbers Can Be a Better Form of Cash than Paper. 174-178 - Jan Verschuren, René Govaerts, Joos Vandewalle:
ISO-OSI Security Architecture. 179-192 - Klaus Vedder:
Security Aspects of Mobile Communications. 193-210 - Walter Fumy:
(Local Area) Network Security. 211-226 - Antoon Bosselaers, René Govaerts, Joos Vandewalle:
Cryptography Within Phase I of the EEC-RACE Programme. 227-234 - Gordon Lennox:
EDI Security. 235-243 - Marc Geoffroy, Ronny Bjones, Hedwig Cnudde:
AXYTRANS: Physical Funds Transport and DES. 244-256 - Bart De Decker:
Unix Security & Kerberos. 257-274
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.