000 -LEADER |
fixed length control field |
00631nam a2200181Ia 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
161214s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
3540208305 |
Terms of availability |
pbk |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004 |
Item number |
CHR |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Christianson, Bruce |
245 #0 - TITLE STATEMENT |
Title |
Security Protocols : 10th International Workshop, Cambridge, UK, April, 2002 : Revised Papers |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Berlin: |
Name of publisher, distributor, etc |
Springer, |
Date of publication, distribution, etc |
2004 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
viii, 241 p.; |
Other physical details |
ill., index: |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price type code |
INR |
Price amount |
2356.20/ EURO 42.00 |
490 ## - SERIES STATEMENT |
Series statement |
Lecture notes in computer science |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Security Protocols, held in Cambridge, UK, in April 2002. The 16 revised full papers presented together with transcriptions of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Also included are abstracts and summaries of an introduction and a keynote, as well as a concluding discussion and statement. Among the topics addressed are authentication, mobile ad-hoc network security, secure distributed document processing, access control, confidentiality, protocol attacks, delegation, certified transfer servers, intrusion tolerance, multi-party communication protocols, IPv6 security, and others |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
multi-party communication protocols |
|
Topical term or geographic name as entry element |
certified transfer servers |
|
Topical term or geographic name as entry element |
intrusion toleranc |
|
Topical term or geographic name as entry element |
Operating systems |
|
Topical term or geographic name as entry element |
Computer software |
|
Topical term or geographic name as entry element |
Information systems |
|
Topical term or geographic name as entry element |
Computer communication networks |
|
Topical term or geographic name as entry element |
Data encryption |
|
Topical term or geographic name as entry element |
Distributed Document Processing |
|
Topical term or geographic name as entry element |
Mobile Ad-Hoc Networks |
|
Topical term or geographic name as entry element |
Mobile IPv6 Security |
|
Topical term or geographic name as entry element |
Dolev-Yao Threat Model |
|
Topical term or geographic name as entry element |
Computers - Access control |
|
Topical term or geographic name as entry element |
Cryptography |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |