Protocols for authentication and key establishment:
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046283120 | ||
003 | DE-604 | ||
005 | 20201120 | ||
007 | cr|uuu---uuuuu | ||
008 | 191204s2020 xx a||| o|||| 00||| eng d | ||
020 | |a 9783662581469 |c Online |9 978-3-662-58146-9 | ||
024 | 7 | |a 10.1007/978-3-662-58146-9 |2 doi | |
035 | |a (ZDB-2-SCS)9783662581469 | ||
035 | |a (OCoLC)1130277091 | ||
035 | |a (DE-599)BVBBV046283120 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-860 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-355 |a DE-188 | ||
082 | 0 | |a 005.73 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Boyd, Colin |d 1959- |e Verfasser |0 (DE-588)1036721086 |4 aut | |
245 | 1 | 0 | |a Protocols for authentication and key establishment |c Colin Boyd, Anish Mathuria, Douglas Stebila |
250 | |a Second edition | ||
264 | 1 | |a Berlin |b Springer |c [2020] | |
300 | |a 1 Online-Ressource (XXVIII, 521 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information security and cryptography |x 1619-7100 | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Security | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Diffie-Hellman-Algorithmus |0 (DE-588)4739863-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 1 | |a Schlüsselverwaltung |0 (DE-588)4625230-7 |D s |
689 | 0 | 2 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 0 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 4 | |a Diffie-Hellman-Algorithmus |0 (DE-588)4739863-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Mathuria, Anish |d ca. 20./21. Jahrhundert |e Verfasser |0 (DE-588)120493231X |4 aut | |
700 | 1 | |a Stebila, Douglas |e Verfasser |0 (DE-588)1204932549 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-662-58145-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-662-58147-6 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-58146-9 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2020 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031660700 | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-634 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-Aug4 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-573 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-M347 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-92 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-898 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-859 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-860 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-861 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-863 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-862 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-523 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-473 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-19 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-355 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-703 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-20 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-706 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-29 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-662-58146-9 |l DE-739 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818986274359345152 |
---|---|
any_adam_object | |
author | Boyd, Colin 1959- Mathuria, Anish ca. 20./21. Jahrhundert Stebila, Douglas |
author_GND | (DE-588)1036721086 (DE-588)120493231X (DE-588)1204932549 |
author_facet | Boyd, Colin 1959- Mathuria, Anish ca. 20./21. Jahrhundert Stebila, Douglas |
author_role | aut aut aut |
author_sort | Boyd, Colin 1959- |
author_variant | c b cb a m am d s ds |
building | Verbundindex |
bvnumber | BV046283120 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)9783662581469 (OCoLC)1130277091 (DE-599)BVBBV046283120 |
dewey-full | 005.73 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.73 |
dewey-search | 005.73 |
dewey-sort | 15.73 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-58146-9 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04650nam a2200889zc 4500</leader><controlfield tag="001">BV046283120</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201120 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191204s2020 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662581469</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-58146-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-58146-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783662581469</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1130277091</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046283120</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.73</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Boyd, Colin</subfield><subfield code="d">1959-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1036721086</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protocols for authentication and key establishment</subfield><subfield code="c">Colin Boyd, Anish Mathuria, Douglas Stebila</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Springer</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXVIII, 521 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security and cryptography</subfield><subfield code="x">1619-7100</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Diffie-Hellman-Algorithmus</subfield><subfield code="0">(DE-588)4739863-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Schlüsselverwaltung</subfield><subfield code="0">(DE-588)4625230-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Diffie-Hellman-Algorithmus</subfield><subfield code="0">(DE-588)4739863-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mathuria, Anish</subfield><subfield code="d">ca. 20./21. Jahrhundert</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)120493231X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stebila, Douglas</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1204932549</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-662-58145-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-662-58147-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2020</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031660700</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-58146-9</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046283120 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:48:11Z |
institution | BVB |
isbn | 9783662581469 |
issn | 1619-7100 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031660700 |
oclc_num | 1130277091 |
open_access_boolean | |
owner | DE-573 DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-355 DE-BY-UBR DE-188 |
owner_facet | DE-573 DE-860 DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-355 DE-BY-UBR DE-188 |
physical | 1 Online-Ressource (XXVIII, 521 Seiten) Illustrationen |
psigel | ZDB-2-SCS ZDB-2-SCS_2020 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer |
record_format | marc |
series2 | Information security and cryptography |
spelling | Boyd, Colin 1959- Verfasser (DE-588)1036721086 aut Protocols for authentication and key establishment Colin Boyd, Anish Mathuria, Douglas Stebila Second edition Berlin Springer [2020] 1 Online-Ressource (XXVIII, 521 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Information security and cryptography 1619-7100 Data Structures and Information Theory Computer Communication Networks Security Systems and Data Security Data structures (Computer science) Computer communication systems Data protection Computer security Datensicherung (DE-588)4011144-1 gnd rswk-swf Kommunikationsprotokoll (DE-588)4128252-8 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd rswk-swf Schlüsselverwaltung (DE-588)4625230-7 gnd rswk-swf Authentifikation (DE-588)4330656-1 s Schlüsselverwaltung (DE-588)4625230-7 s Kommunikationsprotokoll (DE-588)4128252-8 s Datensicherung (DE-588)4011144-1 s Diffie-Hellman-Algorithmus (DE-588)4739863-2 s DE-604 Mathuria, Anish ca. 20./21. Jahrhundert Verfasser (DE-588)120493231X aut Stebila, Douglas Verfasser (DE-588)1204932549 aut Erscheint auch als Druck-Ausgabe 978-3-662-58145-2 Erscheint auch als Druck-Ausgabe 978-3-662-58147-6 https://doi.org/10.1007/978-3-662-58146-9 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Boyd, Colin 1959- Mathuria, Anish ca. 20./21. Jahrhundert Stebila, Douglas Protocols for authentication and key establishment Data Structures and Information Theory Computer Communication Networks Security Systems and Data Security Data structures (Computer science) Computer communication systems Data protection Computer security Datensicherung (DE-588)4011144-1 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Authentifikation (DE-588)4330656-1 gnd Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4128252-8 (DE-588)4330656-1 (DE-588)4739863-2 (DE-588)4625230-7 |
title | Protocols for authentication and key establishment |
title_auth | Protocols for authentication and key establishment |
title_exact_search | Protocols for authentication and key establishment |
title_full | Protocols for authentication and key establishment Colin Boyd, Anish Mathuria, Douglas Stebila |
title_fullStr | Protocols for authentication and key establishment Colin Boyd, Anish Mathuria, Douglas Stebila |
title_full_unstemmed | Protocols for authentication and key establishment Colin Boyd, Anish Mathuria, Douglas Stebila |
title_short | Protocols for authentication and key establishment |
title_sort | protocols for authentication and key establishment |
topic | Data Structures and Information Theory Computer Communication Networks Security Systems and Data Security Data structures (Computer science) Computer communication systems Data protection Computer security Datensicherung (DE-588)4011144-1 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Authentifikation (DE-588)4330656-1 gnd Diffie-Hellman-Algorithmus (DE-588)4739863-2 gnd Schlüsselverwaltung (DE-588)4625230-7 gnd |
topic_facet | Data Structures and Information Theory Computer Communication Networks Security Systems and Data Security Data structures (Computer science) Computer communication systems Data protection Computer security Datensicherung Kommunikationsprotokoll Authentifikation Diffie-Hellman-Algorithmus Schlüsselverwaltung |
url | https://doi.org/10.1007/978-3-662-58146-9 |
work_keys_str_mv | AT boydcolin protocolsforauthenticationandkeyestablishment AT mathuriaanish protocolsforauthenticationandkeyestablishment AT stebiladouglas protocolsforauthenticationandkeyestablishment |