000 -LEADER |
fixed length control field |
00634nam a2200181Ia 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
161214s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
3540425667 |
Terms of availability |
pbk |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004 |
Item number |
CHR |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Christianson, Bruce |
245 #0 - TITLE STATEMENT |
Title |
Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Berlin: |
Name of publisher, distributor, etc |
Springer-Verlag, |
Date of publication, distribution, etc |
2001 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
255 p.; |
Other physical details |
ill., index.: |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price type code |
INR |
Price amount |
1947.60/ EURO 36.00 |
490 ## - SERIES STATEMENT |
Series statement |
Lecture notes in computer science |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Security Protocols held in Cambridge, UK in April 2000. The 21 papers presented with transcriptions of the discussion following the presentation have gone through two rounds of revision and selection; also included are a keynote address and a discussion summary and an afterword by the volume editors. Among the topics addressed are authentication, trust in cyberspace, identification protocols, administration and government issues, specification, access privileges, PKI certificates, trust-based billing systems, public-key cryptosystems, denial of service, anonymous auction protocols, and certification |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security - Congresses |
|
Topical term or geographic name as entry element |
Access control |
|
Topical term or geographic name as entry element |
Cryptography |
|
Topical term or geographic name as entry element |
Computer Communications & Networking |
|
Topical term or geographic name as entry element |
Data security & data encryption |
|
Topical term or geographic name as entry element |
Privacy & data protection |
|
Topical term or geographic name as entry element |
Internet Security |
|
Topical term or geographic name as entry element |
Authentication |
|
Topical term or geographic name as entry element |
Anonymity |
|
Topical term or geographic name as entry element |
Cryptographic Protocols |
|
Topical term or geographic name as entry element |
Algorithms |
|
Topical term or geographic name as entry element |
Information technology |
|
Topical term or geographic name as entry element |
Algorithm Analysis and Problem Complexity |
|
Topical term or geographic name as entry element |
Management of Computing and Information Systems |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |