Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ac/crypto1997.bht:"
@proceedings{DBLP:conf/ac/1997crypto, editor = {Bart Preneel and Vincent Rijmen}, title = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49248-8}, doi = {10.1007/3-540-49248-8}, isbn = {3-540-65474-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/1997crypto.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Bovelander97, author = {Ernst Bovelander}, editor = {Bart Preneel and Vincent Rijmen}, title = {Smart Card Security}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {332--337}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_15}, doi = {10.1007/3-540-49248-8\_15}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Bovelander97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Daemen97, author = {Joan Daemen}, editor = {Bart Preneel and Vincent Rijmen}, title = {Management of Secret Keys: Dynamic Key Handling}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {264--276}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_12}, doi = {10.1007/3-540-49248-8\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Daemen97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Decker97, author = {Bart De Decker}, editor = {Bart Preneel and Vincent Rijmen}, title = {Introduction to Computer Security}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {377--393}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_19}, doi = {10.1007/3-540-49248-8\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Decker97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Fumy97, author = {Walter Fumy}, editor = {Bart Preneel and Vincent Rijmen}, title = {Key Management Techniques}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {142--162}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_6}, doi = {10.1007/3-540-49248-8\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Fumy97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Fumy97a, author = {Walter Fumy}, editor = {Bart Preneel and Vincent Rijmen}, title = {Internet Security Protocols}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {186--208}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_8}, doi = {10.1007/3-540-49248-8\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Fumy97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/HoyleM97, author = {Mark P. Hoyle and Chris J. Mitchell}, editor = {Bart Preneel and Vincent Rijmen}, title = {On Solutions to the Key Escrow Problem}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {277--306}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_13}, doi = {10.1007/3-540-49248-8\_13}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/HoyleM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Knudsen97, author = {Lars R. Knudsen}, editor = {Bart Preneel and Vincent Rijmen}, title = {Block Ciphers - {A} Survey}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {18--48}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_2}, doi = {10.1007/3-540-49248-8\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Knudsen97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Landrock97, author = {Peter Landrock}, editor = {Bart Preneel and Vincent Rijmen}, title = {TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {241--263}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_11}, doi = {10.1007/3-540-49248-8\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Landrock97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Preneel97, author = {Bart Preneel}, editor = {Bart Preneel and Vincent Rijmen}, title = {Cryptographic Primitives for Information Authentication - State of the Art}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {49--104}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_3}, doi = {10.1007/3-540-49248-8\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Preneel97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/PreneelRB97, author = {Bart Preneel and Vincent Rijmen and Antoon Bosselaers}, editor = {Bart Preneel and Vincent Rijmen}, title = {Recent Developments in the Design of Conventional Cryptographic Algorithms}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {105--130}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_4}, doi = {10.1007/3-540-49248-8\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/PreneelRB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Roberts97, author = {David W. Roberts}, editor = {Bart Preneel and Vincent Rijmen}, title = {Security Management - The Process}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {366--376}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_18}, doi = {10.1007/3-540-49248-8\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Roberts97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Schoenmakers97, author = {Berry Schoenmakers}, editor = {Bart Preneel and Vincent Rijmen}, title = {Security Aspects of the Ecash\({}^{\mbox{TM}}\) Payment System}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {338--352}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_16}, doi = {10.1007/3-540-49248-8\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Schoenmakers97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Schutter97, author = {Bart De Schutter}, editor = {Bart Preneel and Vincent Rijmen}, title = {Trends in the Fight Against Computer-Related Delinquency}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {1--17}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_1}, doi = {10.1007/3-540-49248-8\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Schutter97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/VandenwauverJ97, author = {Mark Vandenwauver and Frank Jorissen}, editor = {Bart Preneel and Vincent Rijmen}, title = {Securing Internet Electronic Mail}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {208--223}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_9}, doi = {10.1007/3-540-49248-8\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/VandenwauverJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Vedder97, author = {Klaus Vedder}, editor = {Bart Preneel and Vincent Rijmen}, title = {{GSM:} Security, Services, and the {SIM}}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {224--240}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_10}, doi = {10.1007/3-540-49248-8\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Vedder97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Vedder97a, author = {Klaus Vedder}, editor = {Bart Preneel and Vincent Rijmen}, title = {International Standardisation of {IT} Security}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {353--365}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_17}, doi = {10.1007/3-540-49248-8\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Vedder97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/VedderW97, author = {Klaus Vedder and Franz Weikmann}, editor = {Bart Preneel and Vincent Rijmen}, title = {Smart Cards - Requirements, Properties, and Applications}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {307--331}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_14}, doi = {10.1007/3-540-49248-8\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/VedderW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Verschuren97, author = {Jan Verschuren}, editor = {Bart Preneel and Vincent Rijmen}, title = {Security of Computer Networks}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {163--185}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_7}, doi = {10.1007/3-540-49248-8\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/Verschuren97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/WinP97, author = {Erik De Win and Bart Preneel}, editor = {Bart Preneel and Vincent Rijmen}, title = {Elliptic Curve Public-Key Cryptosystems - An Introduction}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {131--141}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_5}, doi = {10.1007/3-540-49248-8\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/WinP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.