Information security: third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London
Springer
2000
|
Schriftenreihe: | Lecture notes in computer science
1975 |
Schlagworte: | |
Beschreibung: | Literaturangaben |
Beschreibung: | X, 322 S. Ill., graph. Darst. |
ISBN: | 3540414169 |
Internformat
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV013445321 | ||
003 | DE-604 | ||
005 | 20170718 | ||
007 | t| | ||
008 | 001114s2000 gw ad|| |||| 10||| eng d | ||
016 | 7 | |a 960111166 |2 DE-101 | |
020 | |a 3540414169 |9 3-540-41416-9 | ||
035 | |a (OCoLC)45375241 | ||
035 | |a (DE-599)BVBBV013445321 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-384 |a DE-739 |a DE-29T |a DE-526 |a DE-83 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Information security |b third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings |c Josef Pieprzyk ... (ed.) |
264 | 1 | |a Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London |b Springer |c 2000 | |
300 | |a X, 322 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 1975 | |
500 | |a Literaturangaben | ||
650 | 7 | |a Beveiliging |2 gtt | |
650 | 7 | |a Informatiesystemen |2 gtt | |
650 | 4 | |a Ordinateurs - Accès - Contrôle - Congrès | |
650 | 7 | |a Ordinateurs - Accès - Contrôle - Congrès |2 ram | |
650 | 7 | |a Systèmes informatiques - Mesures de sûreté - Congrès |2 ram | |
650 | 4 | |a Sécurité informatique - Congrès | |
650 | 7 | |a authentification |2 inriac | |
650 | 7 | |a commerce électronique |2 inriac | |
650 | 7 | |a cryptographie |2 inriac | |
650 | 7 | |a signature numérique |2 inriac | |
650 | 7 | |a sécurité information |2 inriac | |
650 | 7 | |a sécurité informatique |2 inriac | |
650 | 7 | |a sécurité réseau |2 inriac | |
650 | 7 | |a vie privée |2 inriac | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2000 |z Wollongong |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Pieprzyk, Josef |d 1949- |e Sonstige |0 (DE-588)122464095 |4 oth | |
711 | 2 | |a ISW |n 3 |d 2000 |c Wollongong |j Sonstige |0 (DE-588)10011107-5 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 1975 |w (DE-604)BV000000607 |9 1975 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009177835 |
Datensatz im Suchindex
_version_ | 1820874898404278272 |
---|---|
adam_text | |
any_adam_object | |
author_GND | (DE-588)122464095 |
building | Verbundindex |
bvnumber | BV013445321 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
classification_tum | DAT 460f DAT 050f |
ctrlnum | (OCoLC)45375241 (DE-599)BVBBV013445321 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008cb4500</leader><controlfield tag="001">BV013445321</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170718</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">001114s2000 gw ad|| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">960111166</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540414169</subfield><subfield code="9">3-540-41416-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)45375241</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013445321</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-526</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security</subfield><subfield code="b">third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings</subfield><subfield code="c">Josef Pieprzyk ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 322 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1975</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Beveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatiesystemen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">authentification</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">commerce électronique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">cryptographie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">signature numérique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité information</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité informatique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité réseau</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">vie privée</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2000</subfield><subfield code="z">Wollongong</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pieprzyk, Josef</subfield><subfield code="d">1949-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)122464095</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ISW</subfield><subfield code="n">3</subfield><subfield code="d">2000</subfield><subfield code="c">Wollongong</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10011107-5</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1975</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1975</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009177835</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2000 Wollongong gnd-content |
genre_facet | Konferenzschrift 2000 Wollongong |
id | DE-604.BV013445321 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:07:03Z |
institution | BVB |
institution_GND | (DE-588)10011107-5 |
isbn | 3540414169 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009177835 |
oclc_num | 45375241 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-384 DE-739 DE-29T DE-526 DE-83 DE-706 |
owner_facet | DE-91G DE-BY-TUM DE-384 DE-739 DE-29T DE-526 DE-83 DE-706 |
physical | X, 322 S. Ill., graph. Darst. |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information security third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings Josef Pieprzyk ... (ed.) Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London Springer 2000 X, 322 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 1975 Literaturangaben Beveiliging gtt Informatiesystemen gtt Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Systèmes informatiques - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès authentification inriac commerce électronique inriac cryptographie inriac signature numérique inriac sécurité information inriac sécurité informatique inriac sécurité réseau inriac vie privée inriac Computer security Congresses Computers Access control Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2000 Wollongong gnd-content Datensicherung (DE-588)4011144-1 s DE-604 Pieprzyk, Josef 1949- Sonstige (DE-588)122464095 oth ISW 3 2000 Wollongong Sonstige (DE-588)10011107-5 oth Lecture notes in computer science 1975 (DE-604)BV000000607 1975 |
spellingShingle | Information security third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings Lecture notes in computer science Beveiliging gtt Informatiesystemen gtt Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Systèmes informatiques - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès authentification inriac commerce électronique inriac cryptographie inriac signature numérique inriac sécurité information inriac sécurité informatique inriac sécurité réseau inriac vie privée inriac Computer security Congresses Computers Access control Congresses Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)1071861417 |
title | Information security third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings |
title_auth | Information security third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings |
title_exact_search | Information security third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings |
title_full | Information security third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings Josef Pieprzyk ... (ed.) |
title_fullStr | Information security third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings Josef Pieprzyk ... (ed.) |
title_full_unstemmed | Information security third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings Josef Pieprzyk ... (ed.) |
title_short | Information security |
title_sort | information security third international workshop isw 2000 wollongong australia december 20 21 2000 proceedings |
title_sub | third international workshop, ISW 2000, Wollongong, Australia, December 20 - 21, 2000 ; proceedings |
topic | Beveiliging gtt Informatiesystemen gtt Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Systèmes informatiques - Mesures de sûreté - Congrès ram Sécurité informatique - Congrès authentification inriac commerce électronique inriac cryptographie inriac signature numérique inriac sécurité information inriac sécurité informatique inriac sécurité réseau inriac vie privée inriac Computer security Congresses Computers Access control Congresses Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Beveiliging Informatiesystemen Ordinateurs - Accès - Contrôle - Congrès Systèmes informatiques - Mesures de sûreté - Congrès Sécurité informatique - Congrès authentification commerce électronique cryptographie signature numérique sécurité information sécurité informatique sécurité réseau vie privée Computer security Congresses Computers Access control Congresses Datensicherung Konferenzschrift 2000 Wollongong |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT pieprzykjosef informationsecuritythirdinternationalworkshopisw2000wollongongaustraliadecember20212000proceedings AT iswwollongong informationsecuritythirdinternationalworkshopisw2000wollongongaustraliadecember20212000proceedings |