About these proceedings
This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
Authentication Techniques Authentikationstechniken Information Security Informationssicherheit Key Escrow Privatbereich Schlüsselhinterlegung algorithm algorithms cryptography cryptology linear optimization privacy
Springer-Verlag Berlin Heidelberg 1996
Springer, Berlin, Heidelberg
Springer Book Archive
Series Print ISSN
Series Online ISSN
Buy this book on publisher's site