|
|
|
|
LEADER |
04823cam a2200985 4500 |
001 |
183-719743451 |
003 |
DE-627 |
005 |
20240421233119.0 |
007 |
tu |
008 |
120718s2012 gw ||||| 00| ||eng c |
010 |
|
|
|a 2012943067
|
015 |
|
|
|a 12,N29
|2 dnb
|
015 |
|
|
|a 12,N29
|2 dnb
|
016 |
7 |
|
|a 1024100308
|2 DE-101
|
020 |
|
|
|a 3642322832
|c : Pb. : ca. EUR 49.22 (DE)
|9 3-642-32283-2
|
020 |
|
|
|a 9783642322839
|c kart. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.)
|9 978-3-642-32283-9
|
024 |
3 |
|
|a 9783642322839
|
028 |
5 |
2 |
|a 86144118
|
035 |
|
|
|a (DE-627)719743451
|
035 |
|
|
|a (DE-576)382923774
|
035 |
|
|
|a (DE-599)DNB1024100308
|
035 |
|
|
|a (OCoLC)806059091
|
035 |
|
|
|a (OCoLC)811762847
|
035 |
|
|
|a (ZBM)1250.94008
|
035 |
|
|
|a (ZBM)1250.94008
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-NL
|c XA-GB
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
084 |
|
|
|a SS 4800
|q BVB
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 94A62
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 53.71
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 54.10
|2 bkl
|
090 |
|
|
|a a
|
245 |
1 |
0 |
|a Information theoretic security
|b 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings
|c Adam Smith (ed.)
|
264 |
|
1 |
|a Berlin
|a Heidelberg
|b Springer
|c 2012
|
300 |
|
|
|a VIII, 204 S.
|b Ill., graph. Darst.
|c 235 mm x 155 mm
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ohne Hilfsmittel zu benutzen
|b n
|2 rdamedia
|
338 |
|
|
|a Band
|b nc
|2 rdacarrier
|
490 |
1 |
|
|a Lecture notes in computer science
|v 7412
|
500 |
|
|
|a Literaturangaben
|
583 |
1 |
|
|a Archivierung/Langzeitarchivierung gewährleistet
|f PEBW
|x XA-DE-BW
|2 pdager
|5 DE-31
|
583 |
1 |
|
|a Archivierung prüfen
|c 20240324
|f DE-4165
|z 2
|2 pdager
|
650 |
|
0 |
|a Data encryption (Computer science)
|v Congresses
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Congresses
|
650 |
|
0 |
|a Computer security
|v Congresses
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Montréal
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4026927-9
|0 (DE-627)106286595
|0 (DE-576)208968555
|a Informationstheorie
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4139405-7
|0 (DE-627)105635618
|0 (DE-576)209694084
|a Codierungstheorie
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4660818-7
|0 (DE-627)336841558
|0 (DE-576)214764249
|a Secret-Sharing
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4209132-9
|0 (DE-627)105106836
|0 (DE-576)210190086
|a Kryptosystem
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
689 |
2 |
0 |
|D s
|0 (DE-588)4648342-1
|0 (DE-627)333133455
|0 (DE-576)21463731X
|a Informationsloses Beweissystem
|2 gnd
|
689 |
2 |
1 |
|D s
|0 (DE-588)4480818-5
|0 (DE-627)238164551
|0 (DE-576)212876295
|a Mehrparteienprotokoll
|2 gnd
|
689 |
2 |
|
|5 DE-101
|
700 |
1 |
|
|a Smith, Adam
|e Hrsg.
|4 edt
|
711 |
2 |
|
|a ICITS
|n 6
|d 2012
|c Montréal
|0 (DE-588)1026308119
|0 (DE-627)726449776
|0 (DE-576)371620589
|4 oth
|
776 |
1 |
|
|z 9783642322846
|c (e-ISBN)
|
776 |
0 |
8 |
|i Online-Ausg.
|a Smith, Adam
|t Information Theoretic Security
|d Berlin, Heidelberg : Springer, 2012
|h Online-Ressource (XI, 219 p. 28 illus, digital)
|w (DE-627)1651694230
|w (DE-576)370651626
|z 9783642322846
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7412
|9 7412
|w (DE-627)129300152
|w (DE-576)014492687
|w (DE-600)121909-1
|x 0302-9743
|7 ns
|
856 |
4 |
2 |
|u http://www.loc.gov/catdir/enhancements/fy1305/2012943067-d.html
|x Verlag
|3 Verlagsangaben
|
856 |
4 |
2 |
|u http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm
|m X: MVB
|q text/html
|v 2013-05-01
|x Verlag
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://d-nb.info/1024100308/04
|m B:DE-101
|q application/pdf
|3 Inhaltsverzeichnis
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1250.94008
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
912 |
|
|
|a SSG-OPC-mat
|
924 |
0 |
|
|a 1328439461
|b DE-84
|9 84
|c GBV
|d c
|g 2923-3654
|
924 |
0 |
|
|a 1327781840
|b DE-89
|9 89
|c GBV
|d b
|g RN 2835(7412)
|
924 |
0 |
|
|a 3092354443
|b DE-291-407
|9 291/407
|c BSZ
|d b
|
924 |
0 |
|
|a 3092354540
|b DE-31
|9 31
|c BSZ
|d c
|
924 |
0 |
|
|a 3092354621
|b DE-982
|9 982
|c BSZ
|d d
|
935 |
|
|
|i sf
|
935 |
|
|
|i Blocktest
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 53.71
|j Theoretische Nachrichtentechnik
|0 (DE-627)10641870X
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|0 (DE-627)106418866
|
936 |
b |
k |
|a 54.10
|j Theoretische Informatik
|0 (DE-627)106418815
|
951 |
|
|
|a BO
|
980 |
|
|
|a 719743451
|b 183
|c sid-183-col-kxpbbi
|
SOLR
_version_ |
1797789081448480768 |
author2 |
Smith, Adam |
author2_role |
edt |
author2_variant |
a s as |
author_corporate |
ICITS |
author_corporate_role |
oth |
author_facet |
Smith, Adam, ICITS |
building |
Library A |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25, a |
callnumber-search |
QA76.9.A25, a |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
SSG-OPC-mat, sid-183-col-kxpbbi |
ctrlnum |
(DE-627)719743451, (DE-576)382923774, (DE-599)DNB1024100308, (OCoLC)806059091, (OCoLC)811762847, (ZBM)1250.94008 |
era_facet |
2012 |
facet_912a |
SSG-OPC-mat |
facet_avail |
Local |
facet_local_del330 |
Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience, engineering-electrical |
footnote |
Literaturangaben |
format |
Book, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-print-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
Book |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
Book |
genre |
Konferenzschrift 2012 Montréal (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Congresses, Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Montréal |
hierarchy_parent_id |
183-129300152 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7412 |
hierarchy_top_id |
183-129300152 |
hierarchy_top_title |
Lecture notes in computer science |
id |
183-719743451 |
illustrated |
Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2012 |
imprint_str_mv |
Berlin; Heidelberg: Springer, 2012 |
institution |
FID-BBI-DE-23 |
is_hierarchy_id |
183-719743451 |
is_hierarchy_title |
Information theoretic security: 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings |
isbn |
3642322832, 9783642322839 |
isbn_isn_mv |
9783642322846 |
issn_isn_mv |
0302-9743 |
language |
English |
last_indexed |
2024-04-30T19:27:51.879Z |
lccn |
2012943067 |
marc024a_ct_mv |
9783642322839 |
marc_error |
[geogr_code]Unable to make public java.lang.AbstractStringBuilder java.lang.AbstractStringBuilder.append(java.lang.String) accessible: module java.base does not "opens java.lang" to unnamed module @64e01542 |
match_str |
smith2012informationtheoreticsecurity6thinternationalconferenceicits2012montrealqccanadaaugust15172012proceedings |
mega_collection |
K10plus Verbundkatalog |
multipart_link |
014492687 |
multipart_part |
(014492687)7412 |
oclc_num |
806059091, 811762847 |
physical |
VIII, 204 S.; Ill., graph. Darst; 235 mm x 155 mm |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin |
publisher |
Springer |
record_format |
marcfinc |
record_id |
719743451 |
recordtype |
marcfinc |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7412 |
series2 |
Lecture notes in computer science ; 7412 |
source_id |
183 |
spelling |
Information theoretic security 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings Adam Smith (ed.), Berlin Heidelberg Springer 2012, VIII, 204 S. Ill., graph. Darst. 235 mm x 155 mm, Text txt rdacontent, ohne Hilfsmittel zu benutzen n rdamedia, Band nc rdacarrier, Lecture notes in computer science 7412, Literaturangaben, Archivierung/Langzeitarchivierung gewährleistet PEBW XA-DE-BW pdager DE-31, Archivierung prüfen 20240324 DE-4165 2 pdager, Data encryption (Computer science) Congresses, Computer networks Security measures Congresses, Computer security Congresses, Konferenzschrift 2012 Montréal (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4026927-9 (DE-627)106286595 (DE-576)208968555 Informationstheorie gnd, s (DE-588)4139405-7 (DE-627)105635618 (DE-576)209694084 Codierungstheorie gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, DE-101, s (DE-588)4660818-7 (DE-627)336841558 (DE-576)214764249 Secret-Sharing gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, s (DE-588)4648342-1 (DE-627)333133455 (DE-576)21463731X Informationsloses Beweissystem gnd, s (DE-588)4480818-5 (DE-627)238164551 (DE-576)212876295 Mehrparteienprotokoll gnd, Smith, Adam Hrsg. edt, ICITS 6 2012 Montréal (DE-588)1026308119 (DE-627)726449776 (DE-576)371620589 oth, 9783642322846 (e-ISBN), Online-Ausg. Smith, Adam Information Theoretic Security Berlin, Heidelberg : Springer, 2012 Online-Ressource (XI, 219 p. 28 illus, digital) (DE-627)1651694230 (DE-576)370651626 9783642322846, Lecture notes in computer science 7412 7412 (DE-627)129300152 (DE-576)014492687 (DE-600)121909-1 0302-9743 ns, http://www.loc.gov/catdir/enhancements/fy1305/2012943067-d.html Verlag Verlagsangaben, http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, http://d-nb.info/1024100308/04 B:DE-101 application/pdf Inhaltsverzeichnis, https://zbmath.org/?q=an:1250.94008 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext |
spellingShingle |
Information theoretic security: 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings, Lecture notes in computer science, 7412, Data encryption (Computer science) Congresses, Computer networks Security measures Congresses, Computer security Congresses, Konferenzschrift 2012 Montréal, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll |
title |
Information theoretic security: 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings |
title_auth |
Information theoretic security 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings |
title_full |
Information theoretic security 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings Adam Smith (ed.) |
title_fullStr |
Information theoretic security 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings Adam Smith (ed.) |
title_full_unstemmed |
Information theoretic security 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings Adam Smith (ed.) |
title_in_hierarchy |
7412. Information theoretic security: 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings (2012) |
title_short |
Information theoretic security |
title_sort |
information theoretic security 6th international conference, icits 2012, montreal, qc, canada, august 15 - 17, 2012 ; proceedings |
title_sub |
6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings |
title_unstemmed |
Information theoretic security: 6th international conference, ICITS 2012, Montreal, QC, Canada, August 15 - 17, 2012 ; proceedings |
topic |
Data encryption (Computer science) Congresses, Computer networks Security measures Congresses, Computer security Congresses, Konferenzschrift 2012 Montréal, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll |
topic_facet |
Data encryption (Computer science), Computer networks, Computer security, Security measures, Konferenzschrift, Informationstheorie, Codierungstheorie, Kryptologie, Secret-Sharing, Kryptosystem, Informationsloses Beweissystem, Mehrparteienprotokoll |
url |
http://www.loc.gov/catdir/enhancements/fy1305/2012943067-d.html, http://deposit.d-nb.de/cgi-bin/dokserv?id=4072899&prov=M&dok_var=1&dok_ext=htm, http://d-nb.info/1024100308/04, https://zbmath.org/?q=an:1250.94008 |
work_keys_str_mv |
AT smithadam informationtheoreticsecurity6thinternationalconferenceicits2012montrealqccanadaaugust15172012proceedings, AT icitsmontreal informationtheoreticsecurity6thinternationalconferenceicits2012montrealqccanadaaugust15172012proceedings |