Privacy, security, and trust within the context of pervasive computing

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York Springer 2005
Schriftenreihe:The international series in engineering and computer science 780
Schlagworte:
Online-Zugang:DE-634
DE-M347
DE-473
DE-706
DE-739
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV022417421
003 DE-604
005 20070530
007 cr|uuu---uuuuu
008 070509s2005 xxu o|||| 10||| eng d
020 |a 0387234616  |9 0-387-23461-6 
020 |a 9780387234618  |9 978-0-387-23461-8 
020 |a 9780387234625  |c Online  |9 978-0-387-23462-5 
024 7 |a 10.1007/b101573  |2 doi 
035 |a (OCoLC)873415543 
035 |a (DE-599)BVBBV022417421 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
044 |a xxu  |c US 
049 |a DE-473  |a DE-739  |a DE-706  |a DE-M347  |a DE-634 
050 0 |a QA76.5915 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
245 1 0 |a Privacy, security, and trust within the context of pervasive computing  |c edited by Philip Robinson ... 
264 1 |a New York  |b Springer  |c 2005 
300 |a 1 Online-Ressource (VIII, 167 S.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a The international series in engineering and computer science  |v 780 
500 |a Proceedings of a workshop. 
500 |a Includes bibliographical references and index 
650 4 |a aUbiquitous computing  |a vCongresses 
650 4 |a aMobile computing  |a vCongresses 
650 4 |a aComputer security  |a vCongresses 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Mobile Computing  |0 (DE-588)4694120-4  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2004  |z Wien  |2 gnd-content 
689 0 0 |a Mobile Computing  |0 (DE-588)4694120-4  |D s 
689 0 1 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 |5 DE-604 
700 1 |a Robinson, Philip  |e Sonstige  |4 oth 
830 0 |a The international series in engineering and computer science  |v 780  |w (DE-604)BV048478339  |9 780 
856 4 0 |u https://doi.org/10.1007/b101573  |x Verlag  |3 Volltext 
912 |a ZDB-2-SCS 
943 1 |a oai:aleph.bib-bvb.de:BVB01-015625794 
966 e |u https://doi.org/10.1007/b101573  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/b101573  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/b101573  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/b101573  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/b101573  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819262851071606784
any_adam_object
building Verbundindex
bvnumber BV022417421
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.5915
callnumber-search QA76.5915
callnumber-sort QA 276.5915
callnumber-subject QA - Mathematics
classification_rvk ST 276
collection ZDB-2-SCS
ctrlnum (OCoLC)873415543
(DE-599)BVBBV022417421
discipline Informatik
doi_str_mv 10.1007/b101573
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02357nam a2200565zcb4500</leader><controlfield tag="001">BV022417421</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070530 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">070509s2005 xxu o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387234616</subfield><subfield code="9">0-387-23461-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387234618</subfield><subfield code="9">978-0-387-23461-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387234625</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-387-23462-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b101573</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)873415543</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022417421</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.5915</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy, security, and trust within the context of pervasive computing</subfield><subfield code="c">edited by Philip Robinson ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Springer</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 167 S.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The international series in engineering and computer science</subfield><subfield code="v">780</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Proceedings of a workshop.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aUbiquitous computing</subfield><subfield code="a">vCongresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aMobile computing</subfield><subfield code="a">vCongresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aComputer security</subfield><subfield code="a">vCongresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2004</subfield><subfield code="z">Wien</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Mobile Computing</subfield><subfield code="0">(DE-588)4694120-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robinson, Philip</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">The international series in engineering and computer science</subfield><subfield code="v">780</subfield><subfield code="w">(DE-604)BV048478339</subfield><subfield code="9">780</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b101573</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015625794</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b101573</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b101573</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b101573</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b101573</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b101573</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2004 Wien gnd-content
genre_facet Konferenzschrift 2004 Wien
id DE-604.BV022417421
illustrated Not Illustrated
indexdate 2024-12-23T20:04:13Z
institution BVB
isbn 0387234616
9780387234618
9780387234625
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-015625794
oclc_num 873415543
open_access_boolean
owner DE-473
DE-BY-UBG
DE-739
DE-706
DE-M347
DE-634
owner_facet DE-473
DE-BY-UBG
DE-739
DE-706
DE-M347
DE-634
physical 1 Online-Ressource (VIII, 167 S.)
psigel ZDB-2-SCS
publishDate 2005
publishDateSearch 2005
publishDateSort 2005
publisher Springer
record_format marc
series The international series in engineering and computer science
series2 The international series in engineering and computer science
spelling Privacy, security, and trust within the context of pervasive computing edited by Philip Robinson ...
New York Springer 2005
1 Online-Ressource (VIII, 167 S.)
txt rdacontent
c rdamedia
cr rdacarrier
The international series in engineering and computer science 780
Proceedings of a workshop.
Includes bibliographical references and index
aUbiquitous computing vCongresses
aMobile computing vCongresses
aComputer security vCongresses
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Mobile Computing (DE-588)4694120-4 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift 2004 Wien gnd-content
Mobile Computing (DE-588)4694120-4 s
Computersicherheit (DE-588)4274324-2 s
DE-604
Robinson, Philip Sonstige oth
The international series in engineering and computer science 780 (DE-604)BV048478339 780
https://doi.org/10.1007/b101573 Verlag Volltext
spellingShingle Privacy, security, and trust within the context of pervasive computing
The international series in engineering and computer science
aUbiquitous computing vCongresses
aMobile computing vCongresses
aComputer security vCongresses
Computersicherheit (DE-588)4274324-2 gnd
Mobile Computing (DE-588)4694120-4 gnd
subject_GND (DE-588)4274324-2
(DE-588)4694120-4
(DE-588)1071861417
title Privacy, security, and trust within the context of pervasive computing
title_auth Privacy, security, and trust within the context of pervasive computing
title_exact_search Privacy, security, and trust within the context of pervasive computing
title_full Privacy, security, and trust within the context of pervasive computing edited by Philip Robinson ...
title_fullStr Privacy, security, and trust within the context of pervasive computing edited by Philip Robinson ...
title_full_unstemmed Privacy, security, and trust within the context of pervasive computing edited by Philip Robinson ...
title_short Privacy, security, and trust within the context of pervasive computing
title_sort privacy security and trust within the context of pervasive computing
topic aUbiquitous computing vCongresses
aMobile computing vCongresses
aComputer security vCongresses
Computersicherheit (DE-588)4274324-2 gnd
Mobile Computing (DE-588)4694120-4 gnd
topic_facet aUbiquitous computing vCongresses
aMobile computing vCongresses
aComputer security vCongresses
Computersicherheit
Mobile Computing
Konferenzschrift 2004 Wien
url https://doi.org/10.1007/b101573
volume_link (DE-604)BV048478339
work_keys_str_mv AT robinsonphilip privacysecurityandtrustwithinthecontextofpervasivecomputing