Information security : (Record no. 376273)

MARC details
000 -LEADER
fixed length control field 06780cam a2200877Mi 4500
001 - CONTROL NUMBER
control field ocm56808214
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20211230130858.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 041008s2004 gw a ob 101 u eng d
040 ## - CATALOGING SOURCE
Original cataloging agency QCL
Language of cataloging eng
Description conventions pn
Transcribing agency QCL
Modifying agency OCLCQ
-- BAKER
-- OCLCG
-- N$T
-- YDXCP
-- OCLCQ
-- YNG
-- OCLCQ
-- DKDLA
-- OCLCQ
-- OCLCO
-- OCLCQ
-- GW5XE
-- OCLCF
-- OCLCQ
-- NLGGC
-- OCLCO
-- UA@
-- OCLCQ
-- OCL
-- OCLCO
-- OCLCQ
-- EBLCP
-- ESU
-- UAB
-- OCLCQ
-- SHS
-- OCLCA
-- CEF
-- AU@
-- QE2
-- LEAUB
-- OL$
-- OCLCQ
-- UKAHL
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA476330
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 972113967
Source DE-101
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 013015552
Source Uk
019 ## -
-- 62470313
-- 66012717
-- 144566161
-- 648155139
-- 768062872
-- 1084941513
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3540301445
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540301448
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 3540232087
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9783540232087
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/b100936
Source of number or code doi
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000051329364
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000058161002
029 1# - (OCLC)
OCLC library identifier NLGGC
System control number 268940886
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 14990914
029 1# - (OCLC)
OCLC library identifier NZ1
System control number 15296552
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)56808214
Canceled/invalid control number (OCoLC)62470313
-- (OCoLC)66012717
-- (OCoLC)144566161
-- (OCoLC)648155139
-- (OCoLC)768062872
-- (OCoLC)1084941513
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number I8525 2003
055 #3 - CLASSIFICATION NUMBERS ASSIGNED IN CANADA
Classification number QA75
Item number .L38 no.3225
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code Q
Source lcco
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
084 ## - OTHER CLASSIFICATION NUMBER
Classification number 54.62
Number source bcl
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
111 2# - MAIN ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element ISC 2004
Number of part/section/meeting (7th :
Date of meeting 2004 :
Location of meeting Palo Alto, Ca. USA)
9 (RLIN) 18355
245 10 - TITLE STATEMENT
Title Information security :
Remainder of title 7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings /
Statement of responsibility, etc. Kan Zhang and Yuliang Zheng (eds.).
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Berlin :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. 2004.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xii, 442 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Lecture notes in computer science ;
Volume/sequential designation 3225
490 ## - SERIES STATEMENT
Series statement Serienbezeichnung
500 ## - GENERAL NOTE
General note Title from title screen (viewed Oct. 8, 2004).
500 ## - GENERAL NOTE
General note Print version originally published in 2004.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 7th International Information Security Conference, ISC 2004, held in Palo Alto, CA, USA, in September 2004. The 36 revised full papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on key management, digital signatures, new algorithms, cryptanalysis, intrusion detection, access control, human authentication, certificate management, mobile and ad-hoc security, Web security, digital rights management, and software security.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Key Management -- Practical Authenticated Key Agreement Using Passwords -- Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks -- Storage-Efficient Stateless Group Key Revocation -- Digital Signatures -- Low-Level Ideal Signatures and General Integrity Idealization -- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA -- How to Break and Repair a Universally Composable Signature Functionality -- New Algorithms -- RSA Accumulator Based Broadcast Encryption -- Chameleon Hashing Without Key Exposure -- Radix-r Non-Adjacent Form -- Cryptanalysis -- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor -- Security Analysis of Two Signcryption Schemes -- On The Security of Key Derivation Functions -- Intrusion Detection -- Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery -- A Model for the Semantics of Attack Signatures in Misuse Detection Systems -- Detection of Sniffers in an Ethernet Network -- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks -- Securing DBMS: Characterizing and Detecting Query Floods -- Access Control -- An XML-Based Approach to Document Flow Verification -- Model-Checking Access Control Policies -- A Distributed High Assurance Reference Monitor -- Using Mediated Identity-Based Cryptography to Support Role-Based Access Control -- Human Authentication -- Towards Human Interactive Proofs in the Text-Domain -- Image Recognition CAPTCHAs -- Certificate Management -- A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model -- Certificate Recommendations to Improve the Robustness of Web of Trust -- Mobile and Ad Hoc Security -- Universally Composable Secure Mobile Agent Computation -- Re-thinking Security in IP Based Micro-Mobility -- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group -- Web Security -- Prevent Online Identity Theft -- Using Network Smart Cards for Secure Online Transactions -- Provable Unlinkability Against Traffic Analysis Already After Steps! -- An Efficient Online Electronic Cash with Unlinkable Exact Payments -- Digital Rights Management -- Modifiable Digital Content Protection in P2P -- Survey on the Technological Aspects of Digital Rights Management -- Detecting Software Theft via Whole Program Path Birthmarks -- Software Security -- Effective Security Requirements Analysis: HAZOP and Use Cases -- The Obfuscation Executive.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Form subdivision Congresses.
9 (RLIN) 14968
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control
Form subdivision Congresses.
9 (RLIN) 15312
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Internet
-- Security.
Source of heading or term bisacsh
9 (RLIN) 924386
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Networking
-- Security.
Source of heading or term bisacsh
9 (RLIN) 924387
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
9 (RLIN) 924388
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
Authority record control number (OCoLC)fst00872484
9 (RLIN) 2191
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Access control.
Source of heading or term fast
Authority record control number (OCoLC)fst00872779
9 (RLIN) 15313
653 1# - INDEX TERM--UNCONTROLLED
Uncontrolled term Information security
653 1# - INDEX TERM--UNCONTROLLED
Uncontrolled term ISC
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
9 (RLIN) 396
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings.
Source of term fast
Authority record control number (OCoLC)fst01423772
9 (RLIN) 6065
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zhang, Kan.
9 (RLIN) 18359
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zheng, Yuliang,
Dates associated with a name 1962-
9 (RLIN) 18360
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element LINK (Online service)
9 (RLIN) 924389
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading ISC 2004 (2004 : Palo Alto, Calif.).
Title Information security.
Place, publisher, and date of publication Berlin ; New York : Springer, ©2004
International Standard Book Number 3540232087
Record control number (DLC) 2004112165
-- (OCoLC)56583356
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture notes in computer science ;
Volume number/sequential designation 3225.
9 (RLIN) 924390
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://link-springer-com.libraryproxy.ist.ac.at/10.1007/b100936">https://link-springer-com.libraryproxy.ist.ac.at/10.1007/b100936</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH20751522
938 ## -
-- Baker & Taylor
-- BKTY
-- 84.00
-- 84.00
-- 3540232087
-- 0006112533
-- active
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL3087217
938 ## -
-- EBSCOhost
-- EBSC
-- 144509
938 ## -
-- YBP Library Services
-- YANK
-- 2367962
994 ## -
-- 92
-- ATIST
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     EBook e-Library e-Library 26/06/2020   26/06/2020 26/06/2020 eBook

Powered by Koha