Advances in Cryptology 1981 - 1997 (Record no. 188688)

MARC details
000 -LEADER
fixed length control field 03890nam a22005535i 4500
001 - CONTROL NUMBER
control field 978-3-540-49677-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423132524.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121227s1998 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540496779
-- 978-3-540-49677-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/3-540-49677-7
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA268
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPJ
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.824
Edition number 23
245 10 - TITLE STATEMENT
Title Advances in Cryptology 1981 - 1997
Medium [electronic resource] :
Remainder of title Electronic Proceedings and Index of the CRYPTO and EUROCRYPT Conference, 1981 - 1997 /
Statement of responsibility, etc edited by Kevin S. McCurley, Claus D. Ziegler.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 1998.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 1998.
300 ## - PHYSICAL DESCRIPTION
Extent XIX, 464 p.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume number/sequential designation 1440
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Conference Contents -- CRYPTO ’81 -- EUROCRYPT ’82 -- CRYPTO ’82 -- EUROCRYPT ’83 -- CRYPTO ’83 -- EUROCRYPT ’84 -- CRYPTO ’84 -- EUROCRYPT ’85 -- CRYPTO ’85 -- EUROCRYPT ’86 -- CRYPTO ’86 -- EUROCRYPT ’87 -- CRYPTO ’87 -- EUROCRYPT ’88 -- CRYPTO ’88 -- EUROCRYPT ’89 -- CRYPTO ’89 -- EUROCRYPT ’90 -- CRYPTO ’90 -- EUROCRYPT ’91 -- CRYPTO ’91 -- EUROCRYPT ’92 -- CRYPTO ’92 -- EUROCRYPT ’93 -- CRYPTO ’93 -- EUROCRYPT ’94 -- CRYPTO ’94 -- EUROCRYPT ’95 -- CRYPTO ’95 -- EUROCRYPT ’96 -- CRYPTO ’96 -- EUROCRYPT ’97 -- CRYPTO ’97.
520 ## - SUMMARY, ETC.
Summary, etc AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence,themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to ?nd new ways to use information. These new uses for information serve to highlight our need to protect di?erent aspects of information. Cryptology may be broadly de?ned as the scienti?c study of adversarial information protection. Cryptology has traditionally dealt with the co- dentiality of information, but innovation in using information produces new requirements for protection of that information. Some are longstanding and fundamental - how do we guarantee that information is ”authentic”? How do we guarantee that information is timely? How can we produce bits that have the same properties as ”money”? Each of these questions has been grappled with in the cryptologic research community.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptology.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name McCurley, Kevin S.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ziegler, Claus D.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540650690
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783662168011
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 1611-3349 ;
Volume number/sequential designation 1440
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/3-540-49677-7">https://doi.org/10.1007/3-540-49677-7</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
912 ## -
-- ZDB-2-BAE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in