The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing.
"synopsis" may belong to another edition of this title.
This book is based on a course on the state of the art of computer security and industrial cryptography held at the Katholieke Universiteit Leuven, Belgium in June 1997. The 19 revised full presentations included in the book are developed from lectures given during the course. The areas covered range from theoretical prerequisites and recent technical developments to standardization issues and real-world applications. Among the topics addressed are cryptographic primitives, block ciphers, authentication, cryptographic algorithms, public-key crypto systems, key management, network security, Internet security protocols, key escrow, smart cart security, digital cash, systems security, security management, and IT security standardization.
"About this title" may belong to another edition of this title.
Seller: Jackson Street Booksellers, Omaha, NE, U.S.A.
Soft cover. Condition: Very Good. No Jacket. Very short top front edge corner crease to pages 153 - 192 otherwise Fine in Softcover. 393pp 8vo. Silver spine with red titles. Seller Inventory # 162798
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good. Seller Inventory # 53425318-75
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLIING23Mar3113020173782
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 918219-n
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9783540654742_new
Quantity: Over 20 available
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New. Seller Inventory # 6666-IUK-9783540654742
Quantity: 10 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 918219-n
Quantity: Over 20 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 412. Seller Inventory # 263102805
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto,and Asiacrypt) shows that interest in the eld is increasing. 408 pp. Englisch. Seller Inventory # 9783540654742
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 412 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. Seller Inventory # 5826442
Quantity: 4 available