Narrow your search

Library

KBR (2)

KU Leuven (2)

ULB (2)

ULiège (2)

UCLouvain (1)


Resource type

book (2)


Language

English (2)


Year
From To Submit

1998 (1)

1997 (1)

Listing 1 - 2 of 2
Sort by
Security protocols : international workshop, ambridge, United Kingdom, April 10-12, 1996. Proceedings
Authors: ---
ISBN: 3540624945 3540680470 Year: 1997 Volume: 1189 Publisher: Berlin ; Heidelberg ; New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and coding theory at the Isaac Newton Institute. The 17 revised full papers and one abstract included in the book were carefully selected. Among the topics addressed are several types of public key cryptosystems, digital cash, electronic commerce, digital signatures, and visual cryptography. Besides original theoretical results, the collection of papers show a strong applications-oriented component.

Keywords

Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Sécurité informatique --- Computers --- Cryptography --- Ordinateurs --- Cryptographie --- Congresses --- Access control --- Congrès --- Accès --- Contrôle --- Computer Science --- Engineering & Applied Sciences --- Sécurité informatique --- Congrès --- Accès --- Contrôle --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer mathematics. --- Electrical engineering. --- Computer Science. --- Coding and Information Theory. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Computational Mathematics and Numerical Analysis. --- Communications Engineering, Networks. --- Computer software. --- Computer science --- Telecommunication. --- Cryptology. --- Mathematics. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Software, Computer --- Computer systems --- Mathematics --- Information theory. --- Electric engineering --- Engineering --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication theory --- Cybernetics --- Foundations --- Distributed processing --- Data encryption (Computer science) --- Computer networks.

Security Protocols : 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
Authors: --- --- ---
ISBN: 3540640401 3540696881 9783540640400 Year: 1998 Volume: 1361 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the strictly refereed post-workshop proceedings of the 5th International Workshop on Security Protocols, held in Paris, France, in April 1997. The 17 revised full papers presented address all current aspects of security protocols. Among the topics covered are secure distribution of knowledge, electronic voting systems, secure Internet transactions, digital signatures, key exchange, cryprographic protocols, authentication, threshold systems, secret sharing, ect.

Keywords

Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- Algorithms. --- Combinatorics. --- Electrical engineering. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Computer Communication Networks. --- Communications Engineering, Networks. --- Computer security --- Computers --- Cryptography --- Access control --- Congresses --- Sécurité informatique --- Ordinateurs --- Cryptographie --- Congresses. --- Congrès --- Accès --- Contrôle --- Computer software. --- Telecommunication. --- Cryptology. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Combinatorics --- Algebra --- Mathematical analysis --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Software, Computer --- Computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Arithmetic --- Electric engineering --- Engineering --- Distributed processing --- Foundations --- Computer security - Congresses --- Computers - Access control - Congresses --- Cryptography - Congresses --- Data encryption (Computer science) --- Computer networks. --- Combinatorial analysis.

Listing 1 - 2 of 2
Sort by