Secure transaction protocol analysis: models and applications
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Berlin [u.a.]
Springer
2008
|
Schriftenreihe: | Lecture Notes in Computer Science
5111 |
Schlagwörter: | |
Links: | http://d-nb.info/98938330X/04 |
Umfang: | XI, 234 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 9783540850731 3540850732 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035023150 | ||
003 | DE-604 | ||
005 | 20140123 | ||
007 | t| | ||
008 | 080826s2008 gw ad|| |||| 10||| eng d | ||
015 | |a 08,N29,0008 |2 dnb | ||
016 | 7 | |a 98938330X |2 DE-101 | |
020 | |a 9783540850731 |c : ca. EUR 43.34 (freier Pr.), ca. sfr 67.50 (freier Pr.) |9 978-3-540-85073-1 | ||
020 | |a 3540850732 |9 3-540-85073-2 | ||
024 | 3 | |a 9783540850731 | |
028 | 5 | 2 | |a 12327997 |
035 | |a (OCoLC)233932804 | ||
035 | |a (DE-599)DNB98938330X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-91G |a DE-703 |a DE-83 |a DE-11 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 252f |2 stub | ||
084 | |a WIR 917f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Chen, Qingfeng |e Verfasser |0 (DE-588)1046717618 |4 aut | |
245 | 1 | 0 | |a Secure transaction protocol analysis |b models and applications |c Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2008 | |
300 | |a XI, 234 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 5111 | |
650 | 4 | |a Computer network protocols | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Electronic commerce |x Security measures | |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 2 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Zhang, Chengqi |e Verfasser |0 (DE-588)136277748 |4 aut | |
700 | 1 | |a Zhang, Shichao |e Verfasser |0 (DE-588)123637260 |4 aut | |
830 | 0 | |a Lecture Notes in Computer Science |v 5111 |w (DE-604)BV000000607 |9 5111 | |
856 | 4 | 2 | |u http://d-nb.info/98938330X/04 |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016692240 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 001z 2001 A 999-5111 |
---|---|
DE-BY-TUM_katkey | 1645544 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040010097582 |
_version_ | 1821933331357368320 |
adam_text | |
any_adam_object | |
author | Chen, Qingfeng Zhang, Chengqi Zhang, Shichao |
author_GND | (DE-588)1046717618 (DE-588)136277748 (DE-588)123637260 |
author_facet | Chen, Qingfeng Zhang, Chengqi Zhang, Shichao |
author_role | aut aut aut |
author_sort | Chen, Qingfeng |
author_variant | q c qc c z cz s z sz |
building | Verbundindex |
bvnumber | BV035023150 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | SS 4800 |
classification_tum | DAT 252f WIR 917f DAT 465f |
ctrlnum | (OCoLC)233932804 (DE-599)DNB98938330X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035023150</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140123</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">080826s2008 gw ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N29,0008</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">98938330X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540850731</subfield><subfield code="c">: ca. EUR 43.34 (freier Pr.), ca. sfr 67.50 (freier Pr.)</subfield><subfield code="9">978-3-540-85073-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540850732</subfield><subfield code="9">3-540-85073-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540850731</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12327997</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)233932804</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB98938330X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 252f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 917f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chen, Qingfeng</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1046717618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure transaction protocol analysis</subfield><subfield code="b">models and applications</subfield><subfield code="c">Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 234 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5111</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network protocols</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Chengqi</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)136277748</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhang, Shichao</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123637260</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5111</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5111</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">http://d-nb.info/98938330X/04</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016692240</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV035023150 |
illustrated | Illustrated |
indexdate | 2025-01-11T19:00:21Z |
institution | BVB |
isbn | 9783540850731 3540850732 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016692240 |
oclc_num | 233932804 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-703 DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-703 DE-83 DE-11 |
physical | XI, 234 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spellingShingle | Chen, Qingfeng Zhang, Chengqi Zhang, Shichao Secure transaction protocol analysis models and applications Lecture Notes in Computer Science Computer network protocols Computer networks Security measures Electronic commerce Security measures Formale Methode (DE-588)4333722-3 gnd Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)4011144-1 (DE-588)4592128-3 (DE-588)4709127-7 (DE-588)1071861417 |
title | Secure transaction protocol analysis models and applications |
title_auth | Secure transaction protocol analysis models and applications |
title_exact_search | Secure transaction protocol analysis models and applications |
title_full | Secure transaction protocol analysis models and applications Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang |
title_fullStr | Secure transaction protocol analysis models and applications Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang |
title_full_unstemmed | Secure transaction protocol analysis models and applications Qingfeng Chen ; Chengqi Zhang ; Shichao Zhang |
title_short | Secure transaction protocol analysis |
title_sort | secure transaction protocol analysis models and applications |
title_sub | models and applications |
topic | Computer network protocols Computer networks Security measures Electronic commerce Security measures Formale Methode (DE-588)4333722-3 gnd Datensicherung (DE-588)4011144-1 gnd Electronic Commerce (DE-588)4592128-3 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Computer network protocols Computer networks Security measures Electronic commerce Security measures Formale Methode Datensicherung Electronic Commerce Sicherheitsprotokoll Konferenzschrift |
url | http://d-nb.info/98938330X/04 |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT chenqingfeng securetransactionprotocolanalysismodelsandapplications AT zhangchengqi securetransactionprotocolanalysismodelsandapplications AT zhangshichao securetransactionprotocolanalysismodelsandapplications |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 001z 2001 A 999-5111 Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |