The SCEAS System
Navigation Menu

Conferences in DBLP

Advanced Courses (ac)
1997 (conf/ac/1997crypto)

  1. Bart De Schutter
    Trends in the Fight Against Computer-Related Delinquency. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:1-17 [Conf]
  2. Lars R. Knudsen
    Block Ciphers - A Survey. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:18-48 [Conf]
  3. Bart Preneel
    Cryptographic Primitives for Information Authentication - State of the Art. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:49-104 [Conf]
  4. Bart Preneel, Vincent Rijmen, Antoon Bosselaers
    Recent Developments in the Design of Conventional Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:105-130 [Conf]
  5. Erik De Win, Bart Preneel
    Elliptic Curve Public-Key Cryptosystems - An Introduction. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:131-141 [Conf]
  6. Walter Fumy
    Key Management Techniques. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:142-162 [Conf]
  7. Jan Verschuren
    Security of Computer Networks. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:163-185 [Conf]
  8. Walter Fumy
    Internet Security Protocols. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:186-208 [Conf]
  9. Mark Vandenwauver, Frank Jorissen
    Securing Internet Electronic Mail. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:208-223 [Conf]
  10. Klaus Vedder
    GSM: Security, Services, and the SIM. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:224-240 [Conf]
  11. Peter Landrock
    TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:241-263 [Conf]
  12. Joan Daemen
    Management of Secret Keys: Dynamic Key Handling. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:264-276 [Conf]
  13. Mark P. Hoyle, Chris J. Mitchell
    On Solutions to the Key Escrow Problem. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:277-306 [Conf]
  14. Klaus Vedder, Franz Weikmann
    Smart Cards - Requirements, Properties, and Applications. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:307-331 [Conf]
  15. Ernst Bovelander
    Smart Card Security. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:332-337 [Conf]
  16. Berry Schoenmakers
    Security Aspects of the Ecash™ Payment System. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:338-352 [Conf]
  17. Klaus Vedder
    International Standardisation of IT Security. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:353-365 [Conf]
  18. David W. Roberts
    Security Management - The Process. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:366-376 [Conf]
  19. Bart De Decker
    Introduction to Computer Security. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:377-393 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002