Information and communications security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin u.a.
Springer
2003
|
Schriftenreihe: | Lecture notes in computer science
2836 |
Schlagworte: | |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XI, 416 S. Ill. |
ISBN: | 3540201505 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV017512027 | ||
003 | DE-604 | ||
005 | 20040211 | ||
007 | t| | ||
008 | 030916s2003 gw a||| |||| 10||| eng d | ||
016 | 7 | |a 968749291 |2 DE-101 | |
020 | |a 3540201505 |9 3-540-20150-5 | ||
035 | |a (OCoLC)52970698 | ||
035 | |a (DE-599)BVBBV017512027 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-384 |a DE-91G |a DE-824 |a DE-11 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Information and communications security |b 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings |c Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.) |
264 | 1 | |a Berlin u.a. |b Springer |c 2003 | |
300 | |a XI, 416 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 2836 | |
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a Communicatiesystemen |2 gtt | |
650 | 7 | |a Databescherming |2 gtt | |
650 | 7 | |a Détection d'intrusion |2 rasuqam | |
650 | 7 | |a Mesures de sécurité |2 rasuqam | |
650 | 7 | |a Système de télécommunication |2 rasuqam | |
650 | 7 | |a Sécurité informatique |2 rasuqam | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Telecommunication systems |x Security measures |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2003 |z Hohhot |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | |5 DE-604 | |
700 | 1 | |a Qing, Sihan |e Sonstige |4 oth | |
711 | 2 | |a ICICS |n 5 |d 2003 |c Hohhot |j Sonstige |0 (DE-588)10065163-X |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 2836 |w (DE-604)BV000000607 |9 2836 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-010547267 |
Datensatz im Suchindex
_version_ | 1820874927729803264 |
---|---|
adam_text | |
any_adam_object | |
building | Verbundindex |
bvnumber | BV017512027 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)52970698 (DE-599)BVBBV017512027 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV017512027</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040211</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">030916s2003 gw a||| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">968749291</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540201505</subfield><subfield code="9">3-540-20150-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52970698</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017512027</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information and communications security</subfield><subfield code="b">5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings</subfield><subfield code="c">Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin u.a.</subfield><subfield code="b">Springer</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 416 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">2836</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Communicatiesystemen</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Databescherming</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Détection d'intrusion</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mesures de sécurité</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Système de télécommunication</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sécurité informatique</subfield><subfield code="2">rasuqam</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication systems</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2003</subfield><subfield code="z">Hohhot</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Qing, Sihan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ICICS</subfield><subfield code="n">5</subfield><subfield code="d">2003</subfield><subfield code="c">Hohhot</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10065163-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">2836</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">2836</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010547267</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2003 Hohhot gnd-content |
genre_facet | Konferenzschrift 2003 Hohhot |
id | DE-604.BV017512027 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:07:31Z |
institution | BVB |
institution_GND | (DE-588)10065163-X |
isbn | 3540201505 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010547267 |
oclc_num | 52970698 |
open_access_boolean | |
owner | DE-384 DE-91G DE-BY-TUM DE-824 DE-11 DE-706 |
owner_facet | DE-384 DE-91G DE-BY-TUM DE-824 DE-11 DE-706 |
physical | XI, 416 S. Ill. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Information and communications security 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.) Berlin u.a. Springer 2003 XI, 416 S. Ill. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 2836 Includes bibliographical references and index Communicatiesystemen gtt Databescherming gtt Détection d'intrusion rasuqam Mesures de sécurité rasuqam Système de télécommunication rasuqam Sécurité informatique rasuqam Computer security Congresses Telecommunication systems Security measures Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2003 Hohhot gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Public-Key-Kryptosystem (DE-588)4209133-0 s Datensicherung (DE-588)4011144-1 s Qing, Sihan Sonstige oth ICICS 5 2003 Hohhot Sonstige (DE-588)10065163-X oth Lecture notes in computer science 2836 (DE-604)BV000000607 2836 |
spellingShingle | Information and communications security 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings Lecture notes in computer science Communicatiesystemen gtt Databescherming gtt Détection d'intrusion rasuqam Mesures de sécurité rasuqam Système de télécommunication rasuqam Sécurité informatique rasuqam Computer security Congresses Telecommunication systems Security measures Congresses Datensicherung (DE-588)4011144-1 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)4209133-0 (DE-588)1071861417 |
title | Information and communications security 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings |
title_auth | Information and communications security 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings |
title_exact_search | Information and communications security 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings |
title_full | Information and communications security 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.) |
title_fullStr | Information and communications security 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.) |
title_full_unstemmed | Information and communications security 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.) |
title_short | Information and communications security |
title_sort | information and communications security 5th international conference icics 2003 huhehaote china october 10 13 2003 proceedings |
title_sub | 5th International Conference, ICICS 2003, Huhehaote, China, October 10 - 13, 2003 ; proceedings |
topic | Communicatiesystemen gtt Databescherming gtt Détection d'intrusion rasuqam Mesures de sécurité rasuqam Système de télécommunication rasuqam Sécurité informatique rasuqam Computer security Congresses Telecommunication systems Security measures Congresses Datensicherung (DE-588)4011144-1 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Communicatiesystemen Databescherming Détection d'intrusion Mesures de sécurité Système de télécommunication Sécurité informatique Computer security Congresses Telecommunication systems Security measures Congresses Datensicherung Kryptosystem Kryptologie Public-Key-Kryptosystem Konferenzschrift 2003 Hohhot |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT qingsihan informationandcommunicationssecurity5thinternationalconferenceicics2003huhehaotechinaoctober10132003proceedings AT icicshohhot informationandcommunicationssecurity5thinternationalconferenceicics2003huhehaotechinaoctober10132003proceedings |