Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: ASIACRYPT Peking (VerfasserIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Berlin ; Heidelberg ; New York ; Barcelona ; Budapest u.a. Springer 1998
Schriftenreihe:Lecture notes in computer science 1514
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV035098178
003 DE-604
007 cr|uuu---uuuuu
008 081014s1998 gw d||| o|||| 10||| eng d
020 |a 3540651098  |9 3-540-65109-8 
024 7 |a 10.1007/3-540-49649-1  |2 doi 
035 |a (OCoLC)243486807 
035 |a (DE-599)BVBBV035098178 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
044 |a gw  |c DE 
049 |a DE-19  |a DE-91  |a DE-706  |a DE-739  |a DE-384 
050 0 |a QA76.9.A25 
082 0 |a 005.8  |2 21 
084 |a DAT 465f  |2 stub 
111 2 |a ASIACRYPT  |d 1998  |c Peking  |j Verfasser  |0 (DE-588)2172474-X  |4 aut 
245 1 0 |a Advances in cryptology - ASIACRYPT '98  |b International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings  |c Kazuo Ohta ... (eds.) 
264 1 |a Berlin ; Heidelberg ; New York ; Barcelona ; Budapest u.a.  |b Springer  |c 1998 
300 |a 1 Online-Ressource (XII, 436 S.  |b graph. Darst.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 1514 
650 4 |a Computer security  |x Congresses 
650 4 |a Cryptography  |x Congresses 
650 4 |a Data protection  |x Congresses 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 1998  |z Peking  |2 gnd-content 
689 0 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 1 |5 DE-604 
700 1 |a Ohta, Kazuo  |e Sonstige  |4 oth 
830 0 |a Lecture notes in computer science  |v 1514  |w (DE-604)BV014880109  |9 1514 
856 4 0 |u https://doi.org/10.1007/3-540-49649-1  |3 Volltext 
943 1 |a oai:aleph.bib-bvb.de:BVB01-016766197 

Datensatz im Suchindex

DE-BY-UBM_katkey 3964432
_version_ 1823054110930239488
adam_text
any_adam_object
author_corporate ASIACRYPT Peking
author_corporate_role aut
author_facet ASIACRYPT Peking
author_sort ASIACRYPT Peking
building Verbundindex
bvnumber BV035098178
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
classification_rvk SS 4800
classification_tum DAT 465f
ctrlnum (OCoLC)243486807
(DE-599)BVBBV035098178
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/3-540-49649-1
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035098178</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">081014s1998 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540651098</subfield><subfield code="9">3-540-65109-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/3-540-49649-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)243486807</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035098178</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ASIACRYPT</subfield><subfield code="d">1998</subfield><subfield code="c">Peking</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)2172474-X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology - ASIACRYPT '98</subfield><subfield code="b">International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings</subfield><subfield code="c">Kazuo Ohta ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Barcelona ; Budapest u.a.</subfield><subfield code="b">Springer</subfield><subfield code="c">1998</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 436 S.</subfield><subfield code="b">graph. Darst.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1514</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="x">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1998</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ohta, Kazuo</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1514</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">1514</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/3-540-49649-1</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016766197</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 1998 Peking gnd-content
genre_facet Konferenzschrift 1998 Peking
id DE-604.BV035098178
illustrated Illustrated
indexdate 2025-02-03T17:14:18Z
institution BVB
institution_GND (DE-588)2172474-X
isbn 3540651098
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-016766197
oclc_num 243486807
open_access_boolean
owner DE-19
DE-BY-UBM
DE-91
DE-BY-TUM
DE-706
DE-739
DE-384
owner_facet DE-19
DE-BY-UBM
DE-91
DE-BY-TUM
DE-706
DE-739
DE-384
physical 1 Online-Ressource (XII, 436 S. graph. Darst.)
publishDate 1998
publishDateSearch 1998
publishDateSort 1998
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings
Lecture notes in computer science
Computer security Congresses
Cryptography Congresses
Data protection Congresses
Kryptosystem (DE-588)4209132-9 gnd
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4209132-9
(DE-588)4033329-2
(DE-588)1071861417
title Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings
title_auth Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings
title_exact_search Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings
title_full Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings Kazuo Ohta ... (eds.)
title_fullStr Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings Kazuo Ohta ... (eds.)
title_full_unstemmed Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings Kazuo Ohta ... (eds.)
title_short Advances in cryptology - ASIACRYPT '98
title_sort advances in cryptology asiacrypt 98 international conference on the theory and application of cryptology and information security beijing china october 18 22 1998 proceedings
title_sub International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings
topic Computer security Congresses
Cryptography Congresses
Data protection Congresses
Kryptosystem (DE-588)4209132-9 gnd
Kryptologie (DE-588)4033329-2 gnd
topic_facet Computer security Congresses
Cryptography Congresses
Data protection Congresses
Kryptosystem
Kryptologie
Konferenzschrift 1998 Peking
url https://doi.org/10.1007/3-540-49649-1
volume_link (DE-604)BV014880109
work_keys_str_mv AT asiacryptpeking advancesincryptologyasiacrypt98internationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritybeijingchinaoctober18221998proceedings
AT ohtakazuo advancesincryptologyasiacrypt98internationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritybeijingchinaoctober18221998proceedings