Login / Signup
Computer Security and Industrial Cryptography
1991
1992
1993
1991
1993
Keyphrases
Publications
volume 741, 1993
Computer Security and Industrial Cryptography - State of the Art and Evolution, ESAT Course, Leuven, Belgium, May 21-23, 1991
Computer Security and Industrial Cryptography
741 (1993)
1991
Bart De Schutter
Trends in the Fight Against Computer-Related Delinquency.
Computer Security and Industrial Cryptography
(1991)
Johan van Tilburg
Secret-Key Exchange with Authentication.
Computer Security and Industrial Cryptography
(1991)
Marc Geoffroy
,
Ronny Bjones
,
Hedwig Cnudde
AXYTRANS: Physical Funds Transport and DES.
Computer Security and Industrial Cryptography
(1991)
Walter Fumy
Key Management.
Computer Security and Industrial Cryptography
(1991)
Antoon Bosselaers
,
René Govaerts
,
Joos Vandewalle
Cryptography Within Phase I of the EEC-RACE Programme.
Computer Security and Industrial Cryptography
(1991)
Bart De Decker
Unix Security & Kerberos.
Computer Security and Industrial Cryptography
(1991)
Klaus Vedder
Security Aspects of Mobile Communications.
Computer Security and Industrial Cryptography
(1991)
Jan Verschuren
,
René Govaerts
,
Joos Vandewalle
ISO-OSI Security Architecture.
Computer Security and Industrial Cryptography
(1991)
Dominique de Waleffe
,
Jean-Jacques Quisquater
Better Login Protocols for Computer Networks.
Computer Security and Industrial Cryptography
(1991)
Gordon Lennox
EDI Security.
Computer Security and Industrial Cryptography
(1991)
Bart Preneel
,
René Govaerts
,
Joos Vandewalle
Information Authentication: Hash Functions and Digital Signatures.
Computer Security and Industrial Cryptography
(1991)
Joos Vandewalle
,
René Govaerts
,
Bart Preneel
Technical Approaches to Thwart Computer Fraud.
Computer Security and Industrial Cryptography
(1991)
Bart Preneel
Standardization of Cryptographic Techniques.
Computer Security and Industrial Cryptography
(1991)
Walter Fumy
(Local Area) Network Security.
Computer Security and Industrial Cryptography
(1991)
Marijke De Soete
Public Key Cryptography.
Computer Security and Industrial Cryptography
(1991)
David W. Roberts
Evaluation Criteria for IT Security.
Computer Security and Industrial Cryptography
(1991)
David Chaum
Numbers Can Be a Better Form of Cash than Paper.
Computer Security and Industrial Cryptography
(1991)