The modelling and analysis of security protocols: the CSP approach
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Harlow ; Munich u.a.
Addison-Wesley
2001
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Beschreibung: | XIV, 300 S. Ill. |
ISBN: | 0201674718 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013502653 | ||
003 | DE-604 | ||
005 | 20060224 | ||
007 | t | ||
008 | 001219s2001 a||| |||| 00||| eng d | ||
020 | |a 0201674718 |9 0-201-67471-8 | ||
035 | |a (OCoLC)45846840 | ||
035 | |a (DE-599)BVBBV013502653 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-473 |a DE-384 |a DE-83 |a DE-188 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 252f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a The modelling and analysis of security protocols |b the CSP approach |c P. Y. A. Ryan and S. A. Schneider... |
250 | |a 1. publ. | ||
264 | 1 | |a Harlow ; Munich u.a. |b Addison-Wesley |c 2001 | |
300 | |a XIV, 300 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Mathematisches Modell | |
650 | 4 | |a Computer network protocols | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security |x Mathematical models | |
650 | 4 | |a Computer software |x Verification | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ryan, Peter |e Sonstige |4 oth | |
700 | 1 | |a Schneider, Steve |e Sonstige |4 oth | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009216590 |
Datensatz im Suchindex
_version_ | 1807321527427792896 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV013502653 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 460f DAT 252f DAT 050f |
ctrlnum | (OCoLC)45846840 (DE-599)BVBBV013502653 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV013502653</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060224</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">001219s2001 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0201674718</subfield><subfield code="9">0-201-67471-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)45846840</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013502653</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The modelling and analysis of security protocols</subfield><subfield code="b">the CSP approach</subfield><subfield code="c">P. Y. A. Ryan and S. A. Schneider...</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Harlow ; Munich u.a.</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 300 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematisches Modell</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Mathematical models</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield><subfield code="x">Verification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ryan, Peter</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schneider, Steve</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009216590</subfield></datafield></record></collection> |
id | DE-604.BV013502653 |
illustrated | Illustrated |
indexdate | 2024-08-14T00:42:02Z |
institution | BVB |
isbn | 0201674718 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009216590 |
oclc_num | 45846840 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-473 DE-BY-UBG DE-384 DE-83 DE-188 |
owner_facet | DE-91G DE-BY-TUM DE-473 DE-BY-UBG DE-384 DE-83 DE-188 |
physical | XIV, 300 S. Ill. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Addison-Wesley |
record_format | marc |
spelling | The modelling and analysis of security protocols the CSP approach P. Y. A. Ryan and S. A. Schneider... 1. publ. Harlow ; Munich u.a. Addison-Wesley 2001 XIV, 300 S. Ill. txt rdacontent n rdamedia nc rdacarrier Mathematisches Modell Computer network protocols Computer networks Security measures Computer security Mathematical models Computer software Verification Computers Access control Cryptography Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 s Computersicherheit (DE-588)4274324-2 s DE-604 Ryan, Peter Sonstige oth Schneider, Steve Sonstige oth |
spellingShingle | The modelling and analysis of security protocols the CSP approach Mathematisches Modell Computer network protocols Computer networks Security measures Computer security Mathematical models Computer software Verification Computers Access control Cryptography Computersicherheit (DE-588)4274324-2 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4128252-8 |
title | The modelling and analysis of security protocols the CSP approach |
title_auth | The modelling and analysis of security protocols the CSP approach |
title_exact_search | The modelling and analysis of security protocols the CSP approach |
title_full | The modelling and analysis of security protocols the CSP approach P. Y. A. Ryan and S. A. Schneider... |
title_fullStr | The modelling and analysis of security protocols the CSP approach P. Y. A. Ryan and S. A. Schneider... |
title_full_unstemmed | The modelling and analysis of security protocols the CSP approach P. Y. A. Ryan and S. A. Schneider... |
title_short | The modelling and analysis of security protocols |
title_sort | the modelling and analysis of security protocols the csp approach |
title_sub | the CSP approach |
topic | Mathematisches Modell Computer network protocols Computer networks Security measures Computer security Mathematical models Computer software Verification Computers Access control Cryptography Computersicherheit (DE-588)4274324-2 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd |
topic_facet | Mathematisches Modell Computer network protocols Computer networks Security measures Computer security Mathematical models Computer software Verification Computers Access control Cryptography Computersicherheit Kommunikationsprotokoll |
work_keys_str_mv | AT ryanpeter themodellingandanalysisofsecurityprotocolsthecspapproach AT schneidersteve themodellingandanalysisofsecurityprotocolsthecspapproach |