Filter
Datakryptering
Filter
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The …
Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and …
The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppa`s discovery of algebraic geometry codes around 1980, many …
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this …
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. …
Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Towards a …
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include …
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly presented by WG 11.1 and WG 11.2 of the International Federation …
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information …
The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for …