Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1029)
Included in the following conference series:
Conference proceedings info: CPA 1995.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
Keywords
Table of contents (27 papers)
Other volumes
-
Cryptography: Policy and Algorithms
Bibliographic Information
Book Title: Cryptography: Policy and Algorithms
Book Subtitle: International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings
Editors: Ed Dawson, Jovan Golić
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/BFb0032342
Publisher: Springer Berlin, Heidelberg
-
eBook Packages: Springer Book Archive
Copyright Information: Springer-Verlag Berlin Heidelberg 1996
Softcover ISBN: 978-3-540-60759-5Published: 24 January 1996
eBook ISBN: 978-3-540-49363-1Published: 11 December 2005
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 336
Topics: Systems and Data Security, Cryptology, Database Management, Coding and Information Theory, Combinatorics, Computer Communication Networks