This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and juridical aspects, and between technical developments and standardization issues. Some of the topics are public key cryptography, hash functions, secure protocols, digital signatures, security architectures, network security, and data encryption standards (DES).
This book presents a state-of-the-art review of current perspectives on communications and multimedia security. It examines requirements, issues, and solutions pertinent to securing information networks according to a multi-disciplinary approach covering research aspects, legal aspects, and applications. A wide spectrum of topics is discussed, including:
- network security (Atm, Isdn, Tcp/Ip);
- web security;
- protocols for entity authentication and key agreement;
- protocols for mobile environments;
- applied cryptology;
- watermarking;
- smart cards
.
This volume contains papers presented at the fourth Joint Working Conference on Communications and Multimedia Security (Cms'99), sponsored by the International Federation for Information Processing (Ifip) and held on September 20-21, 1999, in Leuven, Belgium. It constitutes essential reading for information security specialists, computer professionals, communication systems professionals, Edp managers and auditors, and researchers in the area.