Applied public key infrastructure: 4th International Workshop : IWAP 2005
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
c2005
|
Schriftenreihe: | Frontiers in artificial intelligence and applications
v. 128 |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references and author index Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index |
Beschreibung: | 1 Online-Ressource (x, 265 p.) |
ISBN: | 1423799690 1586035509 1607501368 9781423799696 9781586035501 9781607501367 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV043161199 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2005 |||| o||u| ||||||eng d | ||
020 | |a 1423799690 |c electronic bk. |9 1-4237-9969-0 | ||
020 | |a 1586035509 |9 1-58603-550-9 | ||
020 | |a 1607501368 |9 1-60750-136-8 | ||
020 | |a 9781423799696 |c electronic bk. |9 978-1-4237-9969-6 | ||
020 | |a 9781586035501 |9 978-1-58603-550-1 | ||
020 | |a 9781607501367 |9 978-1-60750-136-7 | ||
035 | |a (OCoLC)228144574 | ||
035 | |a (DE-599)BVBBV043161199 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/2 |2 22 | |
110 | 2 | |a International Workshop for Applied PKI < 2005, Singapore> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Applied public key infrastructure |b 4th International Workshop : IWAP 2005 |c edited by Jianying Zhou ... [et al.] |
246 | 1 | 3 | |a IWAP 2005 |
264 | 1 | |a Amsterdam |b IOS Press |c c2005 | |
300 | |a 1 Online-Ressource (x, 265 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Frontiers in artificial intelligence and applications |v v. 128 | |
500 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 | ||
500 | |a Includes bibliographical references and author index | ||
500 | |a Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index | ||
650 | 4 | |a Public key infrastructure (Computer security) | |
650 | 4 | |a Public key cryptography | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Public key cryptography |2 fast | |
650 | 7 | |a Public key infrastructure (Computer security) |2 fast | |
650 | 4 | |a Public key infrastructure (Computer security) |v Congresses | |
650 | 4 | |a Public key cryptography |v Congresses | |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
700 | 1 | |a Zhou, Jianying |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163999 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028585390 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163999 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163999 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175631662972928 |
---|---|
any_adam_object | |
author_corporate | International Workshop for Applied PKI < 2005, Singapore> |
author_corporate_role | aut |
author_facet | International Workshop for Applied PKI < 2005, Singapore> |
author_sort | International Workshop for Applied PKI < 2005, Singapore> |
building | Verbundindex |
bvnumber | BV043161199 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)228144574 (DE-599)BVBBV043161199 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02734nmm a2200541zcb4500</leader><controlfield tag="001">BV043161199</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423799690</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-9969-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1586035509</subfield><subfield code="9">1-58603-550-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607501368</subfield><subfield code="9">1-60750-136-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423799696</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-9969-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781586035501</subfield><subfield code="9">978-1-58603-550-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607501367</subfield><subfield code="9">978-1-60750-136-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228144574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043161199</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">International Workshop for Applied PKI < 2005, Singapore></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applied public key infrastructure</subfield><subfield code="b">4th International Workshop : IWAP 2005</subfield><subfield code="c">edited by Jianying Zhou ... [et al.]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">IWAP 2005</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (x, 265 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Frontiers in artificial intelligence and applications</subfield><subfield code="v">v. 128</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and author index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key infrastructure (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key infrastructure (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key infrastructure (Computer security)</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Public key cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhou, Jianying</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163999</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028585390</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163999</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163999</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV043161199 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:22Z |
institution | BVB |
isbn | 1423799690 1586035509 1607501368 9781423799696 9781586035501 9781607501367 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028585390 |
oclc_num | 228144574 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (x, 265 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | IOS Press |
record_format | marc |
series2 | Frontiers in artificial intelligence and applications |
spelling | International Workshop for Applied PKI < 2005, Singapore> Verfasser aut Applied public key infrastructure 4th International Workshop : IWAP 2005 edited by Jianying Zhou ... [et al.] IWAP 2005 Amsterdam IOS Press c2005 1 Online-Ressource (x, 265 p.) txt rdacontent c rdamedia cr rdacarrier Frontiers in artificial intelligence and applications v. 128 Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Includes bibliographical references and author index Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index Public key infrastructure (Computer security) Public key cryptography COMPUTERS / Security / Cryptography bisacsh Public key cryptography fast Public key infrastructure (Computer security) fast Public key infrastructure (Computer security) Congresses Public key cryptography Congresses (DE-588)1071861417 Konferenzschrift gnd-content Zhou, Jianying Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163999 Aggregator Volltext |
spellingShingle | Applied public key infrastructure 4th International Workshop : IWAP 2005 Public key infrastructure (Computer security) Public key cryptography COMPUTERS / Security / Cryptography bisacsh Public key cryptography fast Public key infrastructure (Computer security) fast Public key infrastructure (Computer security) Congresses Public key cryptography Congresses |
subject_GND | (DE-588)1071861417 |
title | Applied public key infrastructure 4th International Workshop : IWAP 2005 |
title_alt | IWAP 2005 |
title_auth | Applied public key infrastructure 4th International Workshop : IWAP 2005 |
title_exact_search | Applied public key infrastructure 4th International Workshop : IWAP 2005 |
title_full | Applied public key infrastructure 4th International Workshop : IWAP 2005 edited by Jianying Zhou ... [et al.] |
title_fullStr | Applied public key infrastructure 4th International Workshop : IWAP 2005 edited by Jianying Zhou ... [et al.] |
title_full_unstemmed | Applied public key infrastructure 4th International Workshop : IWAP 2005 edited by Jianying Zhou ... [et al.] |
title_short | Applied public key infrastructure |
title_sort | applied public key infrastructure 4th international workshop iwap 2005 |
title_sub | 4th International Workshop : IWAP 2005 |
topic | Public key infrastructure (Computer security) Public key cryptography COMPUTERS / Security / Cryptography bisacsh Public key cryptography fast Public key infrastructure (Computer security) fast Public key infrastructure (Computer security) Congresses Public key cryptography Congresses |
topic_facet | Public key infrastructure (Computer security) Public key cryptography COMPUTERS / Security / Cryptography Public key infrastructure (Computer security) Congresses Public key cryptography Congresses Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=163999 |
work_keys_str_mv | AT internationalworkshopforappliedpki2005singapore appliedpublickeyinfrastructure4thinternationalworkshopiwap2005 AT zhoujianying appliedpublickeyinfrastructure4thinternationalworkshopiwap2005 AT internationalworkshopforappliedpki2005singapore iwap2005 AT zhoujianying iwap2005 |