This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).
"synopsis" may belong to another edition of this title.
Seller: Zubal-Books, Since 1961, Cleveland, OH, U.S.A.
Condition: Good. *Price HAS BEEN REDUCED by 10% until Monday, March 2 (sale item)* 284 pp., Paperback, ex library, else text clean and binding tight. - If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country. Seller Inventory # ZB963578
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9783540573418_new
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New. Seller Inventory # 6666-IUK-9783540573418
Quantity: 10 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer security and cryptography and for practitionersin industry and government.The contributors of the 1991 course were invited to submitrevised and updated versions of their papers for inclusionin a book. This volume is the final result; it is well-balanced between basic theory and real life applications,between mathematical background and juridical aspects, andbetween technical developments and standardization issues.Some of the topics are public key cryptography, hashfunctions, secure protocols, digital signatures, securityarchitectures, network security, and data encryptionstandards (DES). 292 pp. Englisch. Seller Inventory # 9783540573418
Quantity: 2 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer secu. Seller Inventory # 4894282
Quantity: Over 20 available
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer security and cryptography and for practitionersin industry and government.The contributors of the 1991 course were invited to submitrevised and updated versions of their papers for inclusionin a book. This volume is the final result; it is wellbalanced between basic theory and real life applicationsbetween mathematical background and juridical aspects, andbetween technical developments and standardization issues.Some of the topics are public key cryptography, hashfunctions, secure protocols, digital signatures, securityarchitectures, network security, and data encryptionstandards (DES).Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 292 pp. Englisch. Seller Inventory # 9783540573418
Quantity: 1 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer security and cryptography and for practitionersin industry and government.The contributors of the 1991 course were invited to submitrevised and updated versions of their papers for inclusionin a book. This volume is the final result; it is well-balanced between basic theory and real life applications,between mathematical background and juridical aspects, andbetween technical developments and standardization issues.Some of the topics are public key cryptography, hashfunctions, secure protocols, digital signatures, securityarchitectures, network security, and data encryptionstandards (DES). Seller Inventory # 9783540573418
Quantity: 1 available
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Computer Security and Industrial Cryptography | State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 | Bart Preneel (u. a.) | Taschenbuch | viii | Englisch | 1993 | Springer | EAN 9783540573418 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu. Seller Inventory # 102131905
Quantity: 5 available
Seller: Buchpark, Trebbin, Germany
Condition: Gut. Zustand: Gut | Seiten: 292 | Sprache: Englisch | Produktart: Bücher | This volume is based on a course held several times, andagain in 1993, at the ESAT Laboratorium of the Department ofElectrical Engineering at the Katholieke Universiteit Leuvenin Belgium. These courses are intended for both researchersin computer security and cryptography and for practitionersin industry and government.The contributors of the 1991 course were invited to submitrevised and updated versions of their papers for inclusionin a book. This volume is the final result; it is well-balanced between basic theory and real life applications,between mathematical background and juridical aspects, andbetween technical developments and standardization issues.Some of the topics are public key cryptography, hashfunctions, secure protocols, digital signatures, securityarchitectures, network security, and data encryptionstandards (DES). Seller Inventory # 3946070/203
Quantity: 1 available