Secure transaction protocol analysis: models and applications
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2008
|
Schriftenreihe: | Lecture Notes in Computer Science
5111 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XI, 234 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 9783540850731 3540850732 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035023150 | ||
003 | DE-604 | ||
005 | 20140123 | ||
007 | t| | ||
008 | 080826s2008 gw ad|| |||| 10||| eng d | ||
015 | |a 08,N29,0008 |2 dnb | ||
016 | 7 | |a 98938330X |2 DE-101 | |
020 | |a 9783540850731 |c : ca. EUR 43.34 (freier Pr.), ca. sfr 67.50 (freier Pr.) |9 978-3-540-85073-1 | ||
020 | |a 3540850732 |9 3-540-85073-2 | ||
024 | 3 | |a 9783540850731 | |
028 | 5 | 2 | |a 12327997 |
035 | |a (OCoLC)233932804 | ||
035 | |a (DE-599)DNB98938330X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-91G |a DE-703 |a DE-83 |a DE-11 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 252f |2 stub | ||
084 | |a WIR 917f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Chen, Qingfeng |e Verfasser |0 (DE-588)1046717618 |4 aut | |
245 | 1 | 0 | |a Secure transaction protocol analysis |b models and applications |c Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2008 | |
300 | |a XI, 234 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 5111 | |
650 | 4 | |a Computer network protocols | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Electronic commerce |x Security measures | |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Zhang, Chengqi |e Verfasser |0 (DE-588)136277748 |4 aut | |
700 | 1 | |a Zhang, Shichao |e Verfasser |0 (DE-588)123637260 |4 aut | |
830 | 0 | |a Lecture Notes in Computer Science |v 5111 |w (DE-604)BV000000607 |9 5111 | |
856 | 4 | 2 | |u http://d-nb.info/98938330X/04 |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016692240 |
Datensatz im Suchindex
_version_ | 1820875050334552064 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Chen, Qingfeng Zhang, Chengqi Zhang, Shichao |
author_GND | (DE-588)1046717618 (DE-588)136277748 (DE-588)123637260 |
author_facet | Chen, Qingfeng Zhang, Chengqi Zhang, Shichao |
author_role | aut aut aut |
author_sort | Chen, Qingfeng |
author_variant | q c qc c z cz s z sz |
building | Verbundindex |
bvnumber | BV035023150 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | SS 4800 |
classification_tum | DAT 252f WIR 917f DAT 465f |
ctrlnum | (OCoLC)233932804 (DE-599)DNB98938330X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035023150</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140123</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">080826s2008 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N29,0008</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">98938330X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540850731</subfield><subfield code="c">: ca. EUR 43.34 (freier Pr.), ca. sfr 67.50 (freier Pr.)</subfield><subfield code="9">978-3-540-85073-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540850732</subfield><subfield code="9">3-540-85073-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540850731</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12327997</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)233932804</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB98938330X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 917f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chen, Qingfeng</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1046717618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure transaction protocol analysis</subfield><subfield code="b">models and applications</subfield><subfield code="c">Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 234 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5111</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Chengqi</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)136277748</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Shichao</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123637260</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5111</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5111</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://d-nb.info/98938330X/04</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016692240</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV035023150 |
illustrated | Illustrated |
index_date | 2024-07-02T21:47:00Z |
indexdate | 2025-01-10T15:09:28Z |
institution | BVB |
isbn | 9783540850731 3540850732 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016692240 |
oclc_num | 233932804 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-703 DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-703 DE-83 DE-11 |
physical | XI, 234 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Chen, Qingfeng Verfasser (DE-588)1046717618 aut Secure transaction protocol analysis models and applications Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang Berlin [u.a.] Springer 2008 XI, 234 S. Ill., graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 5111 Computer network protocols Computer networks Security measures Electronic commerce Security measures Formale Methode (DE-588)4333722-3 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Sicherheitsprotokoll (DE-588)4709127-7 s Formale Methode (DE-588)4333722-3 s DE-604 Electronic Commerce (DE-588)4592128-3 s Datensicherung (DE-588)4011144-1 s Zhang, Chengqi Verfasser (DE-588)136277748 aut Zhang, Shichao Verfasser (DE-588)123637260 aut Lecture Notes in Computer Science 5111 (DE-604)BV000000607 5111 http://d-nb.info/98938330X/04 Inhaltsverzeichnis |
spellingShingle | Chen, Qingfeng Zhang, Chengqi Zhang, Shichao Secure transaction protocol analysis models and applications Lecture Notes in Computer Science Computer network protocols Computer networks Security measures Electronic commerce Security measures Formale Methode (DE-588)4333722-3 gnd Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)4011144-1 (DE-588)4592128-3 (DE-588)4709127-7 (DE-588)1071861417 |
title | Secure transaction protocol analysis models and applications |
title_auth | Secure transaction protocol analysis models and applications |
title_exact_search | Secure transaction protocol analysis models and applications |
title_exact_search_txtP | Secure transaction protocol analysis models and applications |
title_full | Secure transaction protocol analysis models and applications Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang |
title_fullStr | Secure transaction protocol analysis models and applications Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang |
title_full_unstemmed | Secure transaction protocol analysis models and applications Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang |
title_short | Secure transaction protocol analysis |
title_sort | secure transaction protocol analysis models and applications |
title_sub | models and applications |
topic | Computer network protocols Computer networks Security measures Electronic commerce Security measures Formale Methode (DE-588)4333722-3 gnd Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Computer network protocols Computer networks Security measures Electronic commerce Security measures Formale Methode Datensicherung Electronic Commerce Sicherheitsprotokoll Konferenzschrift |
url | http://d-nb.info/98938330X/04 |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT chenqingfeng securetransactionprotocolanalysismodelsandapplications AT zhangchengqi securetransactionprotocolanalysismodelsandapplications AT zhangshichao securetransactionprotocolanalysismodelsandapplications |