Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers (Record no. 6175)

000 -LEADER
fixed length control field 00634nam a2200181Ia 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161214s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3540425667
Terms of availability pbk
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004
Item number CHR
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Christianson, Bruce
245 #0 - TITLE STATEMENT
Title Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 revised papers
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Berlin:
Name of publisher, distributor, etc Springer-Verlag,
Date of publication, distribution, etc 2001
300 ## - PHYSICAL DESCRIPTION
Extent 255 p.;
Other physical details ill., index.:
Dimensions 24 cm.
365 ## - TRADE PRICE
Price type code INR
Price amount 1947.60/ EURO 36.00
490 ## - SERIES STATEMENT
Series statement Lecture notes in computer science
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Security Protocols held in Cambridge, UK in April 2000. The 21 papers presented with transcriptions of the discussion following the presentation have gone through two rounds of revision and selection; also included are a keynote address and a discussion summary and an afterword by the volume editors. Among the topics addressed are authentication, trust in cyberspace, identification protocols, administration and government issues, specification, access privileges, PKI certificates, trust-based billing systems, public-key cryptosystems, denial of service, anonymous auction protocols, and certification
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security - Congresses
Topical term or geographic name as entry element Access control
Topical term or geographic name as entry element Cryptography
Topical term or geographic name as entry element Computer Communications &​ Networking
Topical term or geographic name as entry element Data security &​ data encryption
Topical term or geographic name as entry element Privacy &​ data protection
Topical term or geographic name as entry element Internet Security
Topical term or geographic name as entry element Authentication
Topical term or geographic name as entry element Anonymity
Topical term or geographic name as entry element Cryptographic Protocols
Topical term or geographic name as entry element Algorithms
Topical term or geographic name as entry element Information technology
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity
Topical term or geographic name as entry element Management of Computing and Information Systems
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Koha item type
          DAIICT DAIICT 2003-09-08 Book India; Invoice No# 1520; 2003-09-07 1947.60 004 CHR 007170 Books

Powered by Koha