Who goes there?: authentication through the lens of privacy
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Washington, D.C.
National Academies Press
c2003
|
Schlagworte: | |
Beschreibung: | Chair: Stephen T. Kent Includes bibliographical references |
Beschreibung: | xviii, 232 p |
ISBN: | 0309088968 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044106563 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2003 |||| o||u| ||||||eng d | ||
020 | |a 0309088968 |c pbk. |9 0-309-08896-8 | ||
035 | |a (ZDB-30-PAD)EBC3375852 | ||
035 | |a (ZDB-89-EBL)EBL3375852 | ||
035 | |a (OCoLC)53986043 | ||
035 | |a (DE-599)BVBBV044106563 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 323.4480973 |2 22 | |
245 | 1 | 0 | |a Who goes there? |b authentication through the lens of privacy |c Committee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors |
246 | 1 | 3 | |a Authentication through the lens of privacy |
264 | 1 | |a Washington, D.C. |b National Academies Press |c c2003 | |
300 | |a xviii, 232 p | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Chair: Stephen T. Kent | ||
500 | |a Includes bibliographical references | ||
650 | 4 | |a Recht | |
650 | 4 | |a Privacy, Right of |z United States | |
650 | 4 | |a Computer networks |x Law and legislation |z United States | |
650 | 4 | |a Computer security |z United States | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Internet |x Law and legislation |z United States | |
651 | 4 | |a USA | |
700 | 1 | |a Kent, Stephen T. |e Sonstige |4 oth | |
700 | 1 | |a Millett, Lynette I. |e Sonstige |4 oth | |
912 | |a ZDB-30-PAD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029513408 |
Datensatz im Suchindex
_version_ | 1804177171579666432 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV044106563 |
collection | ZDB-30-PAD |
ctrlnum | (ZDB-30-PAD)EBC3375852 (ZDB-89-EBL)EBL3375852 (OCoLC)53986043 (DE-599)BVBBV044106563 |
dewey-full | 323.4480973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 323 - Civil and political rights |
dewey-raw | 323.4480973 |
dewey-search | 323.4480973 |
dewey-sort | 3323.4480973 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01661nmm a2200421zc 4500</leader><controlfield tag="001">BV044106563</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309088968</subfield><subfield code="c">pbk.</subfield><subfield code="9">0-309-08896-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC3375852</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL3375852</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53986043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044106563</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">323.4480973</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Who goes there?</subfield><subfield code="b">authentication through the lens of privacy</subfield><subfield code="c">Committee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Authentication through the lens of privacy</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, D.C.</subfield><subfield code="b">National Academies Press</subfield><subfield code="c">c2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xviii, 232 p</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chair: Stephen T. Kent</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kent, Stephen T.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Millett, Lynette I.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029513408</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV044106563 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:43:50Z |
institution | BVB |
isbn | 0309088968 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029513408 |
oclc_num | 53986043 |
open_access_boolean | |
physical | xviii, 232 p |
psigel | ZDB-30-PAD |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | National Academies Press |
record_format | marc |
spelling | Who goes there? authentication through the lens of privacy Committee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors Authentication through the lens of privacy Washington, D.C. National Academies Press c2003 xviii, 232 p txt rdacontent c rdamedia cr rdacarrier Chair: Stephen T. Kent Includes bibliographical references Recht Privacy, Right of United States Computer networks Law and legislation United States Computer security United States Computer networks Security measures United States Internet Law and legislation United States USA Kent, Stephen T. Sonstige oth Millett, Lynette I. Sonstige oth |
spellingShingle | Who goes there? authentication through the lens of privacy Recht Privacy, Right of United States Computer networks Law and legislation United States Computer security United States Computer networks Security measures United States Internet Law and legislation United States |
title | Who goes there? authentication through the lens of privacy |
title_alt | Authentication through the lens of privacy |
title_auth | Who goes there? authentication through the lens of privacy |
title_exact_search | Who goes there? authentication through the lens of privacy |
title_full | Who goes there? authentication through the lens of privacy Committee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors |
title_fullStr | Who goes there? authentication through the lens of privacy Committee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors |
title_full_unstemmed | Who goes there? authentication through the lens of privacy Committee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors |
title_short | Who goes there? |
title_sort | who goes there authentication through the lens of privacy |
title_sub | authentication through the lens of privacy |
topic | Recht Privacy, Right of United States Computer networks Law and legislation United States Computer security United States Computer networks Security measures United States Internet Law and legislation United States |
topic_facet | Recht Privacy, Right of United States Computer networks Law and legislation United States Computer security United States Computer networks Security measures United States Internet Law and legislation United States USA |
work_keys_str_mv | AT kentstephent whogoesthereauthenticationthroughthelensofprivacy AT millettlynettei whogoesthereauthenticationthroughthelensofprivacy AT kentstephent authenticationthroughthelensofprivacy AT millettlynettei authenticationthroughthelensofprivacy |