Information security: second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin u.a.
Springer
1999
|
Schriftenreihe: | Lecture notes in computer science
1729 |
Schlagworte: | |
Beschreibung: | IX, 275 S. Ill., graph. Darst. |
ISBN: | 3540666958 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV012806749 | ||
003 | DE-604 | ||
005 | 19991115 | ||
007 | t| | ||
008 | 991005s1999 gw ad|| |||| 10||| eng d | ||
020 | |a 3540666958 |9 3-540-66695-8 | ||
035 | |a (OCoLC)42733711 | ||
035 | |a (DE-599)BVBBV012806749 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-739 |a DE-91G |a DE-384 |a DE-83 |a DE-188 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
245 | 1 | 0 | |a Information security |b second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings |c Masahiro Mambo ... (ed.) |
264 | 1 | |a Berlin u.a. |b Springer |c 1999 | |
300 | |a IX, 275 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 1729 | |
650 | 7 | |a Analise combinatoria |2 larpcal | |
650 | 7 | |a Beveiliging |2 gtt | |
650 | 7 | |a Informatiesystemen |2 gtt | |
650 | 4 | |a Ordinateurs - Accès - Contrôle - Congrès | |
650 | 7 | |a Ordinateurs - Accès - Contrôle - Congrès |2 ram | |
650 | 7 | |a Ordinateurs - Mesures de sûreté - Congrès |2 ram | |
650 | 4 | |a Sécurité informatique - Congrès | |
650 | 7 | |a authentification |2 inriac | |
650 | 7 | |a commerce électronique |2 inriac | |
650 | 7 | |a empreinte digitale |2 inriac | |
650 | 7 | |a paiement électronique |2 inriac | |
650 | 7 | |a signature numérique |2 inriac | |
650 | 7 | |a sécurité information |2 inriac | |
650 | 7 | |a sécurité informatique |2 inriac | |
650 | 7 | |a sécurité réseau |2 inriac | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 1999 |z Kuala Lumpur |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Mambo, Masahiro |d 1966- |e Sonstige |0 (DE-588)121439232 |4 oth | |
711 | 2 | |a ISW |n 2 |d 1999 |c Kuala Lumpur |j Sonstige |0 (DE-588)2179573-3 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 1729 |w (DE-604)BV000000607 |9 1729 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-008710552 |
Datensatz im Suchindex
_version_ | 1820874886298468352 |
---|---|
adam_text | |
any_adam_object | |
author_GND | (DE-588)121439232 |
building | Verbundindex |
bvnumber | BV012806749 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)42733711 (DE-599)BVBBV012806749 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV012806749</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19991115</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">991005s1999 gw ad|| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540666958</subfield><subfield code="9">3-540-66695-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)42733711</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV012806749</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="b">second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings</subfield><subfield code="c">Masahiro Mambo ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin u.a.</subfield><subfield code="b">Springer</subfield><subfield code="c">1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 275 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1729</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Analise combinatoria</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatiesystemen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ordinateurs - Mesures de sûreté - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">authentification</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">commerce électronique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">empreinte digitale</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">paiement électronique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">signature numérique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité information</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité informatique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité réseau</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1999</subfield><subfield code="z">Kuala Lumpur</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mambo, Masahiro</subfield><subfield code="d">1966-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)121439232</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISW</subfield><subfield code="n">2</subfield><subfield code="d">1999</subfield><subfield code="c">Kuala Lumpur</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)2179573-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1729</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1729</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008710552</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 1999 Kuala Lumpur gnd-content |
genre_facet | Konferenzschrift 1999 Kuala Lumpur |
id | DE-604.BV012806749 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:06:51Z |
institution | BVB |
institution_GND | (DE-588)2179573-3 |
isbn | 3540666958 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008710552 |
oclc_num | 42733711 |
open_access_boolean | |
owner | DE-739 DE-91G DE-BY-TUM DE-384 DE-83 DE-188 DE-706 |
owner_facet | DE-739 DE-91G DE-BY-TUM DE-384 DE-83 DE-188 DE-706 |
physical | IX, 275 S. Ill., graph. Darst. |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings Masahiro Mambo ... (ed.) Berlin u.a. Springer 1999 IX, 275 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 1729 Analise combinatoria larpcal Beveiliging gtt Informatiesystemen gtt Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Ordinateurs - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès authentification inriac commerce électronique inriac empreinte digitale inriac paiement électronique inriac signature numérique inriac sécurité information inriac sécurité informatique inriac sécurité réseau inriac Computer security Congresses Computers Access control Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 1999 Kuala Lumpur gnd-content Datensicherung (DE-588)4011144-1 s DE-604 Kryptologie (DE-588)4033329-2 s Mambo, Masahiro 1966- Sonstige (DE-588)121439232 oth ISW 2 1999 Kuala Lumpur Sonstige (DE-588)2179573-3 oth Lecture notes in computer science 1729 (DE-604)BV000000607 1729 |
spellingShingle | Information security second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings Lecture notes in computer science Analise combinatoria larpcal Beveiliging gtt Informatiesystemen gtt Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Ordinateurs - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès authentification inriac commerce électronique inriac empreinte digitale inriac paiement électronique inriac signature numérique inriac sécurité information inriac sécurité informatique inriac sécurité réseau inriac Computer security Congresses Computers Access control Congresses Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4033329-2 (DE-588)1071861417 |
title | Information security second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings |
title_auth | Information security second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings |
title_exact_search | Information security second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings |
title_full | Information security second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings Masahiro Mambo ... (ed.) |
title_fullStr | Information security second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings Masahiro Mambo ... (ed.) |
title_full_unstemmed | Information security second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings Masahiro Mambo ... (ed.) |
title_short | Information security |
title_sort | information security second international workshop isw 99 kuala lumpur malaysia november 6 7 1999 proceedings |
title_sub | second international workshop, ISW '99, Kuala Lumpur, Malaysia, November 6 - 7, 1999 ; proceedings |
topic | Analise combinatoria larpcal Beveiliging gtt Informatiesystemen gtt Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Ordinateurs - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès authentification inriac commerce électronique inriac empreinte digitale inriac paiement électronique inriac signature numérique inriac sécurité information inriac sécurité informatique inriac sécurité réseau inriac Computer security Congresses Computers Access control Congresses Datensicherung (DE-588)4011144-1 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Analise combinatoria Beveiliging Informatiesystemen Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Mesures de sûreté - Congrès Sécurité informatique - Congrès authentification commerce électronique empreinte digitale paiement électronique signature numérique sécurité information sécurité informatique sécurité réseau Computer security Congresses Computers Access control Congresses Datensicherung Kryptologie Konferenzschrift 1999 Kuala Lumpur |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT mambomasahiro informationsecuritysecondinternationalworkshopisw99kualalumpurmalaysianovember671999proceedings AT iswkualalumpur informationsecuritysecondinternationalworkshopisw99kualalumpurmalaysianovember671999proceedings |