Security protocols 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London Springer 2000
Schriftenreihe:Lecture notes in computer science 1796
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000008cb4500
001 BV013086625
003 DE-604
005 20150113
007 t
008 000328s2000 gw |||| 10||| eng d
016 7 |a 958651965  |2 DE-101 
020 |a 3540673814  |9 3-540-67381-4 
035 |a (OCoLC)43811125 
035 |a (DE-599)BVBBV013086625 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c DE 
049 |a DE-91G  |a DE-384  |a DE-739  |a DE-83  |a DE-188  |a DE-706 
050 0 |a QA76.9.A25 
082 0 |a 005.8  |2 21 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a DAT 460f  |2 stub 
084 |a DAT 252f  |2 stub 
245 1 0 |a Security protocols  |b 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings  |c Bruce Christianson ... (ed.) 
264 1 |a Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London  |b Springer  |c 2000 
300 |a XII, 227 S. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 1796 
500 |a Literaturangaben. 
650 7 |a Algoritmos e estruturas de dados  |2 larpcal 
650 7 |a Beveiliging  |2 gtt 
650 4 |a Cryptographie - Congrès 
650 7 |a Cryptographie - Congrès  |2 ram 
650 7 |a Databanken  |2 gtt 
650 7 |a Gegevens  |2 gtt 
650 7 |a Geheimschrift  |2 gtt 
650 4 |a Ordinateurs - Accès - Contrôle - Congrès 
650 7 |a Ordinateurs - Accès - Contrôle - Congrès  |2 ram 
650 7 |a Redes de computadores e tecnicas  |2 larpcal 
650 7 |a Systèmes informatiques - Mesures de sûreté - Congrès  |2 ram 
650 4 |a Sécurité informatique - Congrès 
650 7 |a authentification  |2 inriac 
650 7 |a cryptographie  |2 inriac 
650 7 |a securite communication  |2 inriac 
650 7 |a securite reseau  |2 inriac 
650 4 |a Computer security  |v Congresses 
650 4 |a Computers  |x Access control  |v Congresses 
650 4 |a Cryptography  |v Congresses 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Datenübertragung  |0 (DE-588)4011150-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Verteiltes System  |0 (DE-588)4238872-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 1999  |z Cambridge  |2 gnd-content 
689 0 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 1 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |D s 
689 0 |5 DE-604 
689 1 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 1 1 |a Kommunikationsprotokoll  |0 (DE-588)4128252-8  |D s 
689 1 |5 DE-604 
689 2 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 2 1 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 2 |5 DE-604 
689 3 0 |a Verteiltes System  |0 (DE-588)4238872-7  |D s 
689 3 1 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 3 |5 DE-604 
689 4 0 |a Datenübertragung  |0 (DE-588)4011150-7  |D s 
689 4 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 4 |8 1\p  |5 DE-604 
689 5 0 |a Verteiltes System  |0 (DE-588)4238872-7  |D s 
689 5 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 5 |8 2\p  |5 DE-604 
700 1 |a Christianson, Bruce  |d 1958-  |e Sonstige  |0 (DE-588)1064909507  |4 oth 
711 2 |a International Workshop on Security Protocols  |n 7  |d 1999  |c Cambridge  |j Sonstige  |0 (DE-588)5514365-9  |4 oth 
830 0 |a Lecture notes in computer science  |v 1796  |w (DE-604)BV000000607  |9 1796 
999 |a oai:aleph.bib-bvb.de:BVB01-008914921 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
883 1 |8 2\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102/DAT 001z 2001 A 999-1796
DE-BY-TUM_katkey 1133806
DE-BY-TUM_local_keycode ko
DE-BY-TUM_media_number 040010541774
_version_ 1816711933265444864
any_adam_object
author_GND (DE-588)1064909507
building Verbundindex
bvnumber BV013086625
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
classification_rvk SS 4800
classification_tum DAT 460f
DAT 252f
ctrlnum (OCoLC)43811125
(DE-599)BVBBV013086625
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03898nam a22009618cb4500</leader><controlfield tag="001">BV013086625</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150113 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">000328s2000 gw |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">958651965</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540673814</subfield><subfield code="9">3-540-67381-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)43811125</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013086625</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security protocols</subfield><subfield code="b">7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings</subfield><subfield code="c">Bruce Christianson ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 227 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1796</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Algoritmos e estruturas de dados</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptographie - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databanken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Gegevens</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Redes de computadores e tecnicas</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">authentification</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptographie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">securite communication</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">securite reseau</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenübertragung</subfield><subfield code="0">(DE-588)4011150-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1999</subfield><subfield code="z">Cambridge</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Datenübertragung</subfield><subfield code="0">(DE-588)4011150-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christianson, Bruce</subfield><subfield code="d">1958-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1064909507</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">International Workshop on Security Protocols</subfield><subfield code="n">7</subfield><subfield code="d">1999</subfield><subfield code="c">Cambridge</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)5514365-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1796</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1796</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008914921</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 1999 Cambridge gnd-content
genre_facet Konferenzschrift 1999 Cambridge
id DE-604.BV013086625
illustrated Not Illustrated
indexdate 2024-11-25T17:16:24Z
institution BVB
institution_GND (DE-588)5514365-9
isbn 3540673814
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-008914921
oclc_num 43811125
open_access_boolean
owner DE-91G
DE-BY-TUM
DE-384
DE-739
DE-83
DE-188
DE-706
owner_facet DE-91G
DE-BY-TUM
DE-384
DE-739
DE-83
DE-188
DE-706
physical XII, 227 S.
publishDate 2000
publishDateSearch 2000
publishDateSort 2000
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Security protocols 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings
Lecture notes in computer science
Algoritmos e estruturas de dados larpcal
Beveiliging gtt
Cryptographie - Congrès
Cryptographie - Congrès ram
Databanken gtt
Gegevens gtt
Geheimschrift gtt
Ordinateurs - Accès - Contrôle - Congrès
Ordinateurs - Accès - Contrôle - Congrès ram
Redes de computadores e tecnicas larpcal
Systèmes informatiques - Mesures de sûreté - Congrès ram
Sécurité informatique - Congrès
authentification inriac
cryptographie inriac
securite communication inriac
securite reseau inriac
Computer security Congresses
Computers Access control Congresses
Cryptography Congresses
Authentifikation (DE-588)4330656-1 gnd
Datenübertragung (DE-588)4011150-7 gnd
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Datensicherung (DE-588)4011144-1 gnd
Verteiltes System (DE-588)4238872-7 gnd
Kryptologie (DE-588)4033329-2 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4330656-1
(DE-588)4011150-7
(DE-588)4128252-8
(DE-588)4011144-1
(DE-588)4238872-7
(DE-588)4033329-2
(DE-588)4293034-0
(DE-588)4274324-2
(DE-588)1071861417
title Security protocols 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings
title_auth Security protocols 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings
title_exact_search Security protocols 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings
title_full Security protocols 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings Bruce Christianson ... (ed.)
title_fullStr Security protocols 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings Bruce Christianson ... (ed.)
title_full_unstemmed Security protocols 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings Bruce Christianson ... (ed.)
title_short Security protocols
title_sort security protocols 7th international workshop cambridge uk april 19 21 1999 proceedings
title_sub 7th international workshop, Cambridge, UK, April 19 - 21, 1999 ; proceedings
topic Algoritmos e estruturas de dados larpcal
Beveiliging gtt
Cryptographie - Congrès
Cryptographie - Congrès ram
Databanken gtt
Gegevens gtt
Geheimschrift gtt
Ordinateurs - Accès - Contrôle - Congrès
Ordinateurs - Accès - Contrôle - Congrès ram
Redes de computadores e tecnicas larpcal
Systèmes informatiques - Mesures de sûreté - Congrès ram
Sécurité informatique - Congrès
authentification inriac
cryptographie inriac
securite communication inriac
securite reseau inriac
Computer security Congresses
Computers Access control Congresses
Cryptography Congresses
Authentifikation (DE-588)4330656-1 gnd
Datenübertragung (DE-588)4011150-7 gnd
Kommunikationsprotokoll (DE-588)4128252-8 gnd
Datensicherung (DE-588)4011144-1 gnd
Verteiltes System (DE-588)4238872-7 gnd
Kryptologie (DE-588)4033329-2 gnd
Zugriffskontrolle (DE-588)4293034-0 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Algoritmos e estruturas de dados
Beveiliging
Cryptographie - Congrès
Databanken
Gegevens
Geheimschrift
Ordinateurs - Accès - Contrôle - Congrès
Redes de computadores e tecnicas
Systèmes informatiques - Mesures de sûreté - Congrès
Sécurité informatique - Congrès
authentification
cryptographie
securite communication
securite reseau
Computer security Congresses
Computers Access control Congresses
Cryptography Congresses
Authentifikation
Datenübertragung
Kommunikationsprotokoll
Datensicherung
Verteiltes System
Kryptologie
Zugriffskontrolle
Computersicherheit
Konferenzschrift 1999 Cambridge
volume_link (DE-604)BV000000607
work_keys_str_mv AT christiansonbruce securityprotocols7thinternationalworkshopcambridgeukapril19211999proceedings
AT internationalworkshoponsecurityprotocolscambridge securityprotocols7thinternationalworkshopcambridgeukapril19211999proceedings