Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Weber, Stefan G. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Amsterdam IOS Press c2012
Schriftenreihe:Cryptology and information security series v.9
Schlagworte:
Online-Zugang:DE-1046
DE-1047
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV043121484
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151126s2012 xx o|||| 00||| eng d
020 |a 161499157X  |c electronic bk.  |9 1-61499-157-X 
020 |a 9781614991571  |c electronic bk.  |9 978-1-61499-157-1 
035 |a (OCoLC)824133749 
035 |a (DE-599)BVBBV043121484 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 004  |2 23 
100 1 |a Weber, Stefan G.  |e Verfasser  |4 aut 
245 1 0 |a Multilaterally secure pervasive cooperation  |b privacy protection, accountability and secure communication for the age of pervasive computing  |c Stefan G. Weber 
264 1 |a Amsterdam  |b IOS Press  |c c2012 
300 |a 1 Online-Ressource 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a Cryptology and information security series  |v v.9 
500 |a Includes bibliographical references 
650 7 |a COMPUTERS / Computer Literacy  |2 bisacsh 
650 7 |a COMPUTERS / Computer Science  |2 bisacsh 
650 7 |a COMPUTERS / Data Processing  |2 bisacsh 
650 7 |a COMPUTERS / Hardware / General  |2 bisacsh 
650 7 |a COMPUTERS / Information Technology  |2 bisacsh 
650 7 |a COMPUTERS / Machine Theory  |2 bisacsh 
650 7 |a COMPUTERS / Reference  |2 bisacsh 
650 4 |a Informatik 
650 4 |a Ubiquitous computing  |x Security measures 
650 4 |a Data encryption (Computer science) 
710 2 |a IOS Press  |e Sonstige  |4 oth 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028545675 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563  |l DE-1046  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563  |l DE-1047  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819295450306445312
any_adam_object
author Weber, Stefan G.
author_facet Weber, Stefan G.
author_role aut
author_sort Weber, Stefan G.
author_variant s g w sg sgw
building Verbundindex
bvnumber BV043121484
collection ZDB-4-EBA
ctrlnum (OCoLC)824133749
(DE-599)BVBBV043121484
dewey-full 004
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 004 - Computer science
dewey-raw 004
dewey-search 004
dewey-sort 14
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02073nam a2200481zcb4500</leader><controlfield tag="001">BV043121484</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2012 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">161499157X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-61499-157-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614991571</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-61499-157-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)824133749</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043121484</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Weber, Stefan G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Multilaterally secure pervasive cooperation</subfield><subfield code="b">privacy protection, accountability and secure communication for the age of pervasive computing</subfield><subfield code="c">Stefan G. Weber</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v.9</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ubiquitous computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=529563</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028545675</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=529563</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=529563</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043121484
illustrated Not Illustrated
indexdate 2024-12-24T04:42:24Z
institution BVB
isbn 161499157X
9781614991571
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028545675
oclc_num 824133749
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher IOS Press
record_format marc
series2 Cryptology and information security series
spelling Weber, Stefan G. Verfasser aut
Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing Stefan G. Weber
Amsterdam IOS Press c2012
1 Online-Ressource
txt rdacontent
c rdamedia
cr rdacarrier
Cryptology and information security series v.9
Includes bibliographical references
COMPUTERS / Computer Literacy bisacsh
COMPUTERS / Computer Science bisacsh
COMPUTERS / Data Processing bisacsh
COMPUTERS / Hardware / General bisacsh
COMPUTERS / Information Technology bisacsh
COMPUTERS / Machine Theory bisacsh
COMPUTERS / Reference bisacsh
Informatik
Ubiquitous computing Security measures
Data encryption (Computer science)
IOS Press Sonstige oth
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563 Aggregator Volltext
spellingShingle Weber, Stefan G.
Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing
COMPUTERS / Computer Literacy bisacsh
COMPUTERS / Computer Science bisacsh
COMPUTERS / Data Processing bisacsh
COMPUTERS / Hardware / General bisacsh
COMPUTERS / Information Technology bisacsh
COMPUTERS / Machine Theory bisacsh
COMPUTERS / Reference bisacsh
Informatik
Ubiquitous computing Security measures
Data encryption (Computer science)
title Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing
title_auth Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing
title_exact_search Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing
title_full Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing Stefan G. Weber
title_fullStr Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing Stefan G. Weber
title_full_unstemmed Multilaterally secure pervasive cooperation privacy protection, accountability and secure communication for the age of pervasive computing Stefan G. Weber
title_short Multilaterally secure pervasive cooperation
title_sort multilaterally secure pervasive cooperation privacy protection accountability and secure communication for the age of pervasive computing
title_sub privacy protection, accountability and secure communication for the age of pervasive computing
topic COMPUTERS / Computer Literacy bisacsh
COMPUTERS / Computer Science bisacsh
COMPUTERS / Data Processing bisacsh
COMPUTERS / Hardware / General bisacsh
COMPUTERS / Information Technology bisacsh
COMPUTERS / Machine Theory bisacsh
COMPUTERS / Reference bisacsh
Informatik
Ubiquitous computing Security measures
Data encryption (Computer science)
topic_facet COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Informatik
Ubiquitous computing Security measures
Data encryption (Computer science)
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=529563
work_keys_str_mv AT weberstefang multilaterallysecurepervasivecooperationprivacyprotectionaccountabilityandsecurecommunicationfortheageofpervasivecomputing
AT iospress multilaterallysecurepervasivecooperationprivacyprotectionaccountabilityandsecurecommunicationfortheageofpervasivecomputing