This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Zubal-Books, Since 1961, Cleveland, OH, USA
Zustand: Good. *Price HAS BEEN REDUCED by 10% until Monday, Jan. 5 (sale item)* 284 pp., Paperback, ex library, else text clean and binding tight. - If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country. Artikel-Nr. ZB963578
Anzahl: 1 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer security and cryptography and for practitionersin industry and government.The contributors of the 1991 course were invited to submitrevised and updated versions of their papers for inclusionin a book. This volume is the final result; it is well-balanced between basic theory and real life applications,between mathematical background and juridical aspects, andbetween technical developments and standardization issues.Some of the topics are public key cryptography, hashfunctions, secure protocols, digital signatures, securityarchitectures, network security, and data encryptionstandards (DES). Artikel-Nr. 9783540573418
Anzahl: 1 verfügbar
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Gut. Zustand: Gut | Seiten: 292 | Sprache: Englisch | Produktart: Bücher | This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer security and cryptography and for practitionersin industry and government.The contributors of the 1991 course were invited to submitrevised and updated versions of their papers for inclusionin a book. This volume is the final result; it is well-balanced between basic theory and real life applications,between mathematical background and juridical aspects, andbetween technical developments and standardization issues.Some of the topics are public key cryptography, hashfunctions, secure protocols, digital signatures, securityarchitectures, network security, and data encryptionstandards (DES). Artikel-Nr. 3946070/203
Anzahl: 1 verfügbar