Computer security in the age of information: proceedings of the Fifth IFIP International Conference on Computer Security, IFIP/Sec '88, Gold Coast, Queensland, Australia, 19-21 May, 1988
North-Holland, 1989 - Computers - 490 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Generating Multiprecision Integers with Guaranteed
A Secure Relational Database
31 other sections not shown
abuse task force access control Age of Information algorithm application audit auditor authorised automated boolean functions cipher communications components computer abuse task computer crime computer security computer system criminal crypt cryptographic Data Encryption Standard database defined dependence device digital signature disk dossier EFTPOS ensure environment evaluation expert systems facilities hardware Huffman compression IFIP implementation information systems inode inode-id input integrity internal control key distribution key management key scheduling mainframe module node node-i non-linearity Office-net operating system organisation output password path performed permutations personal computers preimplementation review procedures protection Publishers B.V. North-Holland RACF random risk S-box scheme Science Publishers B.V. SDLC secret session key smart card specific standards substitution cipher systems security techniques telecommunications terminal TICOM tion transaction unauthorised user authentication