menu
{ "item_title" : "Computer Security and Industrial Cryptography", "item_author" : [" Bart Preneel", "Rene Govaerts", "Joos Vandewalle "], "item_description" : "This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/3/54/057/341/3540573410_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Computer Security and Industrial Cryptography|Bart Preneel

Computer Security and Industrial Cryptography : State of the Art and Evolution. Esat Course, Leuven, Belgium, May 21-23, 1991

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).

This item is Non-Returnable

Details

  • ISBN-13: 9783540573418
  • ISBN-10: 3540573410
  • Publisher: Springer
  • Publish Date: October 1993
  • Dimensions: 9.21 x 6.14 x 0.62 inches
  • Shipping Weight: 0.92 pounds
  • Page Count: 284

Related Categories

You May Also Like...

    1

BAM Customer Reviews