Record ID | ia:computersecurity0000unse_d8y2 |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/computersecurity0000unse_d8y2/computersecurity0000unse_d8y2_marc.xml |
Download MARC binary | https://www.archive.org/download/computersecurity0000unse_d8y2/computersecurity0000unse_d8y2_meta.mrc |
LEADER: 05467cam 2201033 a 4500
001 ocm28891064
003 OCoLC
005 20201026214419.0
008 930907s1993 gw a b 001 0 eng
006 m d
007 cr unu|uuuuu||
010 $a 93032467
040 $aDLC$beng$cDLC$dNLGGC$dBTCTA$dLVB$dYDXCP$dOCLCG$dBAKER$dZWZ$dHEBIS$dDEBBG$dOCLCQ$dSNU$dOCLCQ$dGBVCP$dOCLCO$dOCLCF$dOCLCQ$dTFW$dOCLCQ$dUV1$dOCLCA$dOCLCQ$dOCLCO$dOCLCQ$dOCLCA$dOCLCQ$dLWA
015 $a93,N48,0285$2dnb
015 $a94,A08,0572$2dnb
016 7 $a931406544$2DE-101
019 $a190831982$a230945884$a811373331$a969378319$a976619320$a986697755$a1012084921$a1013266744$a1016283149$a1019653558$a1020029700$a1030063169$a1162633374$a1172231042
020 $a0387573410$q(alk. paper ;$qU.S.)
020 $a9780387573410$q(alk. paper ;$qU.S.)
020 $a3540573410
020 $a9783540573418
035 $a(OCoLC)28891064$z(OCoLC)190831982$z(OCoLC)230945884$z(OCoLC)811373331$z(OCoLC)969378319$z(OCoLC)976619320$z(OCoLC)986697755$z(OCoLC)1012084921$z(OCoLC)1013266744$z(OCoLC)1016283149$z(OCoLC)1019653558$z(OCoLC)1020029700$z(OCoLC)1030063169$z(OCoLC)1162633374$z(OCoLC)1172231042
050 00 $aQA76.9.A25$bC6373 1993
082 00 $a005.8$220
084 $a54.62$2bcl
084 $a54.32$2bcl
084 $a54.38$2bcl
084 $a54.54$2bcl
084 $a*00B25$2msc
084 $a68-06$2msc
084 $a68P25$2msc
084 $a94-06$2msc
084 $a94A60$2msc
084 $aSS 4800$2rvk
084 $a28$2sdnb
084 $aDAT 050f$2stub
084 $aDAT 460f$2stub
084 $aDAT 465f$2stub
245 00 $aComputer security and industrial cryptography :$bstate of the art and evolution : ESAT course, Leuven, Belgium, May 21-23, 1991 /$cBart Preneel, René Govaerts, Joos Vandewalle, (eds.).
260 $aBerlin ;$aNew York :$bSpringer-Verlag,$c©1993.
300 $aviii, 274 pages :$billustrations ;$c24 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aLecture notes in computer science ;$v741
504 $aIncludes bibliographical references and index.
505 0 $aTrends in the Fight Against Computer-Related Delinquency / Bart De Schutter -- Technical Approaches to Thwart Computer Fraud / Joos Vandewalle, Rene Govaerts and Bart Preneel -- Public Key Cryptography / Marijke De Soete -- Better Login Protocols for Computer Networks / Dominique de Waleffe and Jean-Jacques Quisquater -- Secret-Key Exchange with Authentication / Johan van Tilburg -- Information Authentication: Hash Functions and Digital Signatures / Bart Preneel, Rene Govaerts and Joos Vandewalle -- Key Management / Walter Fumy -- Evaluation Criteria for IT Security / David W. Roberts -- Standardization of Cryptographic Techniques / Bart Preneel -- Numbers Can Be a Better Form of Cash than Paper / David Chaum -- ISO-OSI Security Architecture / Jan Verschuren, Rene Govaerts and Joos Vandewalle -- Security Aspects of Mobile Communications / Klaus Vedder -- (Local Area) Network Security / Walter Fumy.
505 8 $aCryptography Within Phase I of the EEC-RACE Programme / Antoon Bosselaers, Rene Govaerts and Joos Vandewalle -- EDI security / Gordon Lennox -- AXYTRANS: Physical Funds Transport and DES / Marc Geoffroy, Ronny Bjones and Hedwig Cnudde -- Unix Security & Kerberos / Bart De Decker.
650 0 $aComputer security.
650 0 $aCryptography.
650 6 $aCryptographie.
650 6 $aSécurité informatique.
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aCryptography.$2fast$0(OCoLC)fst00884552
650 17 $aGeheimschrift.$2gtt
650 17 $aComputerbeveiliging.$2gtt
650 7 $aKryptologie$2gnd
650 7 $aComputersicherheit$2gnd
650 7 $aCryptographie.$2ram
650 7 $aSystèmes informatiques$xMesures de sûreté.$2ram
651 7 $aLöwen <1991>$2swd
653 0 $aComputer security
653 0 $aCryptography
655 4 $aElectronic resources (Books)
655 7 $aLöwen (1991)$2swd
700 1 $aPreneel, Bart,$d1963-
700 1 $aGovaerts, René.
700 1 $aVandewalle, J.$q(Joos),$d1948-
776 08 $iOnline version:$tComputer security and industrial cryptography.$dBerlin ; New York : Springer-Verlag, ©1993$w(OCoLC)609052925
776 08 $iOnline version:$tComputer security and industrial cryptography.$dBerlin ; New York : Springer-Verlag, ©1993$w(OCoLC)623213958
830 0 $aLecture notes in computer science ;$v741.
856 41 $3(n.149, 1983 - current) available via SpringerLink$uhttp://www.library.tufts.edu/ezproxy/ezproxy.asp?LOCATION=SpLinkLeNoCoSc
856 41 $3Table of contents$uhttp://www.gbv.de/dms/bowker/toc/9780387573410.pdf
856 42 $uhttp://www.zentralblatt-math.org/zmath/en/search/?an=0803.00031$3Inhaltstext
938 $aBaker & Taylor$bBKTY$c48.95$d48.95$i0387573410$n0002384710$sactive
938 $aBaker and Taylor$bBTCP$n93032467$cDM58.00
938 $aYBP Library Services$bYANK$n100041573
029 1 $aAU@$b000010475264
029 1 $aDEBBG$bBV008338447
029 1 $aDEBBG$bBV022167228
029 1 $aDEBSZ$b036024384
029 1 $aGBVCP$b128474033
029 1 $aHEBIS$b027135713
029 1 $aNLGGC$b111036127
029 1 $aNZ1$b4292448
029 1 $aYDXCP$b325244
029 1 $aZWZ$b017591988
994 $aZ0$bP4A
948 $hHELD BY P4A - 229 OTHER HOLDINGS