|
|
|
|
LEADER |
01615cam a2200445 a 4500 |
001 |
180-016169220 |
003 |
Uk |
005 |
20161129144009.0 |
008 |
120727s2012 gw a b |101 0|eng d |
007 |
tu |
010 |
|
|
|a 2012943067
|
015 |
|
|
|a GBB292605
|2 bnb
|
020 |
|
|
|a 9783642322839 (pbk.)
|
020 |
|
|
|a 3642322832 (pbk.)
|
020 |
|
|
|z 9783642322846 (e-book)
|
040 |
|
|
|a Uk
|b eng
|c Uk
|
042 |
|
|
|a ukblsr
|
082 |
0 |
4 |
|a 005.8
|2 23
|
111 |
2 |
|
|a ICITS (Conference)
|n (6th :
|d 2012 :
|c Montréal, Québec)
|
245 |
1 |
0 |
|a Information theoretic security
|b 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings
|c Adam Smith (ed.)
|
260 |
|
|
|a Heidelberg
|b Springer
|c c2012
|
300 |
|
|
|a viii, 204 p. :
|b ill. ;
|c 24 cm.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a unmediated
|2 rdamedia
|
338 |
|
|
|a volume
|2 rdacarrier
|
490 |
0 |
|
|a Lecture notes in computer science
|x 0302-9743 ;
|v 7412
|
490 |
0 |
|
|a LNCS sublibrary. SL 4, Security and cryptology
|
530 |
|
|
|a Also issued online.
|
504 |
|
|
|a Includes bibliographical references and index.
|
591 |
|
|
|a Selected papers.
|
540 |
|
|
|a Current copyright fee: GBP19.00
|c 42\0
|5 Uk
|
650 |
|
0 |
|a Database security
|v Congresses.
|
650 |
|
0 |
|a Computer security
|v Congresses.
|
650 |
|
0 |
|a Information theory
|v Congresses.
|
653 |
1 |
|
|a Information theoretic security
|
653 |
1 |
|
|a ICITS
|
700 |
1 |
|
|a Smith, Adam
|q (Adam Davison).
|
856 |
|
|
|3 1850-9999
|u http://www.springer.com/gb/
|x BLDSS
|
945 |
|
|
|a Lecture notes in computer science, ISSN 0302-9743 ; no 7412 2012
|
980 |
|
|
|a 016169220
|b 180
|c sid-180-col-bnbfidbbi
|
SOLR
_version_ |
1778756597841920000 |
access_facet |
Local Holdings |
author2 |
Smith, Adam |
author2_fuller |
(Adam Davison). |
author2_role |
|
author2_variant |
a s as |
author_corporate |
ICITS (Conference) (6th : 2012 : Montréal, Québec) |
author_corporate_role |
|
author_facet |
Smith, Adam, ICITS (Conference) (6th : 2012 : Montréal, Québec) |
author_sort |
ICITS (Conference) Montréal, Québec) |
building |
Library A |
callnumber-sort |
|
collection |
sid-180-col-bnbfidbbi |
dewey-full |
005.8 |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-ones |
005 - Computer programming, programs & data |
dewey-raw |
005.8 |
dewey-search |
005.8 |
dewey-sort |
15.8 |
dewey-tens |
000 - Computer science, knowledge & systems |
facet_avail |
Local |
facet_topic_nrw_music |
Information theoretic security, ICITS |
finc_class_facet |
Informatik |
fincclass_txtF_mv |
science-computerscience |
format |
Book |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
genre_facet |
Congresses. |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
id |
180-016169220 |
illustrated |
Illustrated |
imprint |
Heidelberg, Springer, c2012 |
imprint_str_mv |
Heidelberg Springer c2012 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
|
is_hierarchy_title |
|
isbn |
9783642322839 (pbk.), 3642322832 (pbk.) |
isbn_isn_mv |
9783642322846 (e-book) |
isil_str_mv |
FID-BBI-DE-23 |
issn_isn_mv |
0302-9743 ; |
language |
English |
last_indexed |
2023-10-03T17:34:41.878Z |
lccn |
2012943067 |
match_str |
smith2012informationtheoreticsecurity6thinternationalconferenceicits2012montrealqccanadaaugust15172012proceedings |
mega_collection |
British National Bibliography |
physical |
viii, 204 p.; ill; 24 cm |
publishDate |
c2012 |
publishDateSort |
2012 |
publishPlace |
Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
016169220 |
recordtype |
marcfinc |
rvk_facet |
No subject assigned |
series2 |
Lecture notes in computer science ; 7412, LNCS sublibrary. SL 4, Security and cryptology |
source_id |
180 |
spelling |
ICITS (Conference) (6th : 2012 : Montréal, Québec), Information theoretic security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings Adam Smith (ed.), Heidelberg Springer c2012, viii, 204 p. : ill. ; 24 cm., text rdacontent, unmediated rdamedia, volume rdacarrier, Lecture notes in computer science 0302-9743 ; 7412, LNCS sublibrary. SL 4, Security and cryptology, Also issued online., Includes bibliographical references and index., Selected papers., Current copyright fee: GBP19.00 42\0 Uk, Database security Congresses., Computer security Congresses., Information theory Congresses., Information theoretic security, ICITS, Smith, Adam (Adam Davison)., 1850-9999 http://www.springer.com/gb/ BLDSS |
spellingShingle |
Information theoretic security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings, Database security Congresses., Computer security Congresses., Information theory Congresses., Information theoretic security, ICITS |
title |
Information theoretic security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings |
title_auth |
Information theoretic security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings |
title_full |
Information theoretic security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings Adam Smith (ed.) |
title_fullStr |
Information theoretic security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings Adam Smith (ed.) |
title_full_unstemmed |
Information theoretic security 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings Adam Smith (ed.) |
title_short |
Information theoretic security |
title_sort |
information theoretic security 6th international conference icits 2012 montreal qc canada august 15 17 2012 proceedings |
title_sub |
6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012 : proceedings |
topic |
Database security Congresses., Computer security Congresses., Information theory Congresses., Information theoretic security, ICITS |
topic_facet |
Database security, Computer security, Information theory, Information theoretic security, ICITS |