Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Berlin u.a. Springer 2004
Schriftenreihe:Lecture notes in computer science 3225
Schlagworte:
Online-Zugang:TUM01
UBA01
UBM01
UPA01
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000 cb4500
001 BV035061720
003 DE-604
005 00000000000000.0
006 a |||| 10|||
007 cr|uuu---uuuuu
008 080919s2004 gw |||| o||u| ||||||eng d
020 |a 3540232087  |9 3-540-23208-7 
024 7 |a 10.1007/b100936  |2 doi 
035 |a (OCoLC)249904006 
035 |a (DE-599)BVBBV035061720 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c DE 
049 |a DE-19  |a DE-91  |a DE-739  |a DE-384 
082 0 |a 005.8 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a DAT 460f  |2 stub 
084 |a DAT 050f  |2 stub 
245 1 0 |a Information security  |b 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings  |c Kan Zhang ... (eds.) 
264 1 |a Berlin u.a.  |b Springer  |c 2004 
300 |a 1 Online-Ressource (XII, 442 S.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 3225 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Eindringerkennung  |0 (DE-588)4706627-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Datensicherung  |0 (DE-588)4011144-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Authentifikation  |0 (DE-588)4330656-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Rechnernetz  |0 (DE-588)4070085-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Elektronische Unterschrift  |0 (DE-588)4269037-7  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2004  |z Palo Alto Calif.  |2 gnd-content 
689 0 0 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 0 |5 DE-604 
689 1 0 |a Authentifikation  |0 (DE-588)4330656-1  |D s 
689 1 |5 DE-604 
689 2 0 |a Eindringerkennung  |0 (DE-588)4706627-1  |D s 
689 2 |5 DE-604 
689 3 0 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 3 1 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 3 2 |a Elektronische Unterschrift  |0 (DE-588)4269037-7  |D s 
689 3 |5 DE-604 
689 4 0 |a Rechnernetz  |0 (DE-588)4070085-9  |D s 
689 4 1 |a Datensicherung  |0 (DE-588)4011144-1  |D s 
689 4 2 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 4 |5 DE-604 
700 1 |a Zhang, Kan  |e Sonstige  |4 oth 
711 2 |a ISC  |n 7  |d 2004  |c Palo Alto, Calif.  |j Sonstige  |0 (DE-588)10088677-2  |4 oth 
830 0 |a Lecture notes in computer science  |v 3225  |w (DE-604)BV014880109  |9 3225 
856 4 0 |u https://doi.org/10.1007/b100936  |x Verlag  |3 Volltext 
912 |a ZDB-2-LNC 
999 |a oai:aleph.bib-bvb.de:BVB01-016730229 
966 e |u https://doi.org/10.1007/b100936  |l TUM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/b100936  |l UBA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/b100936  |l UBM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/b100936  |l UPA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 1647161
_version_ 1816712837454626817
adam_txt
any_adam_object
any_adam_object_boolean
building Verbundindex
bvnumber BV035061720
classification_rvk SS 4800
classification_tum DAT 460f
DAT 050f
collection ZDB-2-LNC
ctrlnum (OCoLC)249904006
(DE-599)BVBBV035061720
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
discipline_str_mv Informatik
doi_str_mv 10.1007/b100936
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02941nmm a2200721 cb4500</leader><controlfield tag="001">BV035061720</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">080919s2004 gw |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540232087</subfield><subfield code="9">3-540-23208-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/b100936</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)249904006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035061720</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="b">7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings</subfield><subfield code="c">Kan Zhang ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin u.a.</subfield><subfield code="b">Springer</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 442 S.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">3225</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2004</subfield><subfield code="z">Palo Alto Calif.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Elektronische Unterschrift</subfield><subfield code="0">(DE-588)4269037-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Kan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISC</subfield><subfield code="n">7</subfield><subfield code="d">2004</subfield><subfield code="c">Palo Alto, Calif.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10088677-2</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">3225</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">3225</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/b100936</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016730229</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b100936</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b100936</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b100936</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/b100936</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2004 Palo Alto Calif. gnd-content
genre_facet Konferenzschrift 2004 Palo Alto Calif.
id DE-604.BV035061720
illustrated Not Illustrated
index_date 2024-07-02T22:00:44Z
indexdate 2024-11-25T17:26:05Z
institution BVB
institution_GND (DE-588)10088677-2
isbn 3540232087
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-016730229
oclc_num 249904006
open_access_boolean
owner DE-19
DE-BY-UBM
DE-91
DE-BY-TUM
DE-739
DE-384
owner_facet DE-19
DE-BY-UBM
DE-91
DE-BY-TUM
DE-739
DE-384
physical 1 Online-Ressource (XII, 442 S.)
psigel ZDB-2-LNC
publishDate 2004
publishDateSearch 2004
publishDateSort 2004
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings
Lecture notes in computer science
Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptosystem (DE-588)4209132-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Datensicherung (DE-588)4011144-1 gnd
Authentifikation (DE-588)4330656-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Elektronische Unterschrift (DE-588)4269037-7 gnd
subject_GND (DE-588)4293034-0
(DE-588)4209132-9
(DE-588)4706627-1
(DE-588)4011144-1
(DE-588)4330656-1
(DE-588)4070085-9
(DE-588)4274324-2
(DE-588)4269037-7
(DE-588)1071861417
title Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings
title_auth Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings
title_exact_search Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings
title_exact_search_txtP Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings
title_full Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings Kan Zhang ... (eds.)
title_fullStr Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings Kan Zhang ... (eds.)
title_full_unstemmed Information security 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings Kan Zhang ... (eds.)
title_short Information security
title_sort information security 7th international conference isc 2004 palo alto ca usa september 27 29 2004 proceedings
title_sub 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27 - 29, 2004 ; proceedings
topic Zugriffskontrolle (DE-588)4293034-0 gnd
Kryptosystem (DE-588)4209132-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Datensicherung (DE-588)4011144-1 gnd
Authentifikation (DE-588)4330656-1 gnd
Rechnernetz (DE-588)4070085-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
Elektronische Unterschrift (DE-588)4269037-7 gnd
topic_facet Zugriffskontrolle
Kryptosystem
Eindringerkennung
Datensicherung
Authentifikation
Rechnernetz
Computersicherheit
Elektronische Unterschrift
Konferenzschrift 2004 Palo Alto Calif.
url https://doi.org/10.1007/b100936
volume_link (DE-604)BV014880109
work_keys_str_mv AT zhangkan informationsecurity7thinternationalconferenceisc2004paloaltocausaseptember27292004proceedings
AT iscpaloaltocalif informationsecurity7thinternationalconferenceisc2004paloaltocausaseptember27292004proceedings