Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings: Lecture Notes in Computer Science, cartea 1029
Editat de Edward Pyle Dawson, Jovan Golicen Limba Engleză Paperback – 24 ian 1996
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 341.95 lei
- 20% Preț: 369.12 lei
- 20% Preț: 645.28 lei
- 20% Preț: 591.51 lei
- 15% Preț: 580.46 lei
- Preț: 410.88 lei
- 20% Preț: 504.57 lei
- Preț: 381.21 lei
- 20% Preț: 340.32 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 538.29 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 238.01 lei
- 17% Preț: 360.19 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 596.46 lei
- 15% Preț: 438.59 lei
- 20% Preț: 655.02 lei
- 20% Preț: 649.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 310.26 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 326.98 lei
- 20% Preț: 825.93 lei
- 17% Preț: 427.22 lei
- 20% Preț: 763.23 lei
- 20% Preț: 350.21 lei
- 20% Preț: 307.71 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 20% Preț: 343.62 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 353.50 lei
- 20% Preț: 607.39 lei
Preț: 334.86 lei
Preț vechi: 418.57 lei
-20% Nou
Puncte Express: 502
Preț estimativ în valută:
64.09€ • 66.66$ • 53.71£
64.09€ • 66.66$ • 53.71£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540607595
ISBN-10: 3540607595
Pagini: 348
Ilustrații: XII, 336 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.49 kg
Ediția:1996
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540607595
Pagini: 348
Ilustrații: XII, 336 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.49 kg
Ediția:1996
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Open forum — Cryptography: Personal freedom and law enforcement is it possible to get agreement?.- Privacy and security policy choices in an NII environment.- Commercial Key Escrow: An Australian perspective.- Encryption and the Global Information Infrastructure: An Australian perspective.- Crypto in Europe — markets, law and policy.- Saving dollars makes sense of crypto export controls.- A proposed architecture for trusted third party services.- A new key escrow cryptosystem.- How to fairly reconstruct a shared secret.- A note on nonuniform decimation of periodic sequences.- Randomness measures related to subset occurrence.- Low order approximation of cipher functions.- Multiple encryption with minimum key.- A one-key cryptosystem based on a finite nonlinear automaton.- A cryptanalysis of clock-controlled shift registers with multiple steps.- Discrete optimisation and fast correlation attacks.- Keyed hash functions.- Some active attacks on fast server-aided secret computation protocols for modular exponentiation.- Cryptanalysis of the enhanced ElGamal's signature scheme.- Access with pseudonyms.- A new identification algorithm.- Public-key cryptography on smart cards.- Integrating smart cards into authentication systems.- Smart-card with interferometric quantum cryptography device.- Cryptographic APIs.- Foiling active network impersonation attacks made in collusion with an insider.- The CASS shell.