MARC details
| 000 -LEADER |
| fixed length control field |
07381cam a2200973Mi 4500 |
| 001 - CONTROL NUMBER |
| control field |
ocm56808214 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250703143105.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr ||||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
041008s2004 gw a ob 101 u eng d |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
QCL |
| Language of cataloging |
eng |
| Description conventions |
pn |
| Transcribing agency |
QCL |
| Modifying agency |
OCLCQ |
| -- |
BAKER |
| -- |
OCLCG |
| -- |
N$T |
| -- |
YDXCP |
| -- |
OCLCQ |
| -- |
YNG |
| -- |
OCLCQ |
| -- |
DKDLA |
| -- |
OCLCQ |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
GW5XE |
| -- |
OCLCF |
| -- |
OCLCQ |
| -- |
NLGGC |
| -- |
OCLCO |
| -- |
UA@ |
| -- |
OCLCQ |
| -- |
OCL |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
EBLCP |
| -- |
ESU |
| -- |
UAB |
| -- |
OCLCQ |
| -- |
SHS |
| -- |
OCLCA |
| -- |
CEF |
| -- |
AU@ |
| -- |
QE2 |
| -- |
LEAUB |
| -- |
OL$ |
| -- |
OCLCQ |
| -- |
UKAHL |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
INT |
| -- |
WSU |
| -- |
OCLCO |
| -- |
OCLCL |
| -- |
OCLCO |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBA476330 |
| Source |
bnb |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
| Record control number |
972113967 |
| Source |
DE-101 |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER |
| Record control number |
013015552 |
| Source |
Uk |
| 019 ## - |
| -- |
62470313 |
| -- |
66012717 |
| -- |
144566161 |
| -- |
648155139 |
| -- |
768062872 |
| -- |
1084941513 |
| -- |
1374607989 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
3540301445 |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9783540301448 |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
3540232087 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
9783540232087 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9788354030140 |
| Qualifying information |
(8) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
8354030148 |
| 024 7# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
10.1007/b100936 |
| Source of number or code |
doi |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000051329364 |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000058161002 |
| 029 1# - (OCLC) |
| OCLC library identifier |
NLGGC |
| System control number |
268940886 |
| 029 1# - (OCLC) |
| OCLC library identifier |
NZ1 |
| System control number |
14990914 |
| 029 1# - (OCLC) |
| OCLC library identifier |
NZ1 |
| System control number |
15296552 |
| 029 1# - (OCLC) |
| OCLC library identifier |
DKDLA |
| System control number |
820120-katalog:999912281805765 |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000060386969 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)56808214 |
| Canceled/invalid control number |
(OCoLC)62470313 |
| -- |
(OCoLC)66012717 |
| -- |
(OCoLC)144566161 |
| -- |
(OCoLC)648155139 |
| -- |
(OCoLC)768062872 |
| -- |
(OCoLC)1084941513 |
| -- |
(OCoLC)1374607989 |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
I8525 2003 |
| 055 #3 - CLASSIFICATION NUMBERS ASSIGNED IN CANADA |
| Classification number |
QA75 |
| Item number |
.L38 no.3225 |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
060040 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
043050 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM |
| Subject category code subdivision |
053000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
URY |
| Source |
bicssc |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
Q |
| Source |
lcco |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
22 |
| 084 ## - OTHER CLASSIFICATION NUMBER |
| Classification number |
54.62 |
| Number source |
bcl |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| Holding library |
MAIN |
| 111 2# - MAIN ENTRY--MEETING NAME |
| Meeting name or jurisdiction name as entry element |
ISC 2004 |
| Number of part/section/meeting |
(7th : |
| Date of meeting |
2004 : |
| Location of meeting |
Palo Alto, Ca. USA) |
| 9 (RLIN) |
18355 |
| 245 10 - TITLE STATEMENT |
| Title |
Information security : |
| Remainder of title |
7th International Conference ISC 2004, Palo Alto, Ca. USA, September 27-29, 2004 : proceedings / |
| Statement of responsibility, etc. |
Kan Zhang and Yuliang Zheng (eds.). |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc. |
Berlin : |
| Name of publisher, distributor, etc. |
Springer, |
| Date of publication, distribution, etc. |
2004. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource (xii, 442 pages) : |
| Other physical details |
illustrations |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| File type |
text file |
| Encoding format |
PDF |
| Source |
rda |
| 490 1# - SERIES STATEMENT |
| Series statement |
Lecture notes in computer science ; |
| Volume/sequential designation |
3225 |
| 500 ## - GENERAL NOTE |
| General note |
Title from title screen (viewed Oct. 8, 2004). |
| 500 ## - GENERAL NOTE |
| General note |
Print version originally published in 2004. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This book constitutes the refereed proceedings of the 7th International Information Security Conference, ISC 2004, held in Palo Alto, CA, USA, in September 2004. The 36 revised full papers presented were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on key management, digital signatures, new algorithms, cryptanalysis, intrusion detection, access control, human authentication, certificate management, mobile and ad-hoc security, Web security, digital rights management, and software security. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Key Management -- Practical Authenticated Key Agreement Using Passwords -- Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks -- Storage-Efficient Stateless Group Key Revocation -- Digital Signatures -- Low-Level Ideal Signatures and General Integrity Idealization -- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA -- How to Break and Repair a Universally Composable Signature Functionality -- New Algorithms -- RSA Accumulator Based Broadcast Encryption -- Chameleon Hashing Without Key Exposure -- Radix-r Non-Adjacent Form -- Cryptanalysis -- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor -- Security Analysis of Two Signcryption Schemes -- On The Security of Key Derivation Functions -- Intrusion Detection -- Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery -- A Model for the Semantics of Attack Signatures in Misuse Detection Systems -- Detection of Sniffers in an Ethernet Network -- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks -- Securing DBMS: Characterizing and Detecting Query Floods -- Access Control -- An XML-Based Approach to Document Flow Verification -- Model-Checking Access Control Policies -- A Distributed High Assurance Reference Monitor -- Using Mediated Identity-Based Cryptography to Support Role-Based Access Control -- Human Authentication -- Towards Human Interactive Proofs in the Text-Domain -- Image Recognition CAPTCHAs -- Certificate Management -- A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model -- Certificate Recommendations to Improve the Robustness of Web of Trust -- Mobile and Ad Hoc Security -- Universally Composable Secure Mobile Agent Computation -- Re-thinking Security in IP Based Micro-Mobility -- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group -- Web Security -- Prevent Online Identity Theft -- Using Network Smart Cards for Secure Online Transactions -- Provable Unlinkability Against Traffic Analysis Already After Steps! -- An Efficient Online Electronic Cash with Unlinkable Exact Payments -- Digital Rights Management -- Modifiable Digital Content Protection in P2P -- Survey on the Technological Aspects of Digital Rights Management -- Detecting Software Theft via Whole Program Path Birthmarks -- Software Security -- Effective Security Requirements Analysis: HAZOP and Use Cases -- The Obfuscation Executive. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| Form subdivision |
Congresses. |
| 9 (RLIN) |
14968 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Access control |
| Form subdivision |
Congresses. |
| 9 (RLIN) |
15312 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Sécurité informatique |
| Form subdivision |
Congrès. |
| 9 (RLIN) |
17411 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Ordinateurs |
| General subdivision |
Accès |
| -- |
Contrôle |
| Form subdivision |
Congrès. |
| 9 (RLIN) |
20704 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS |
| General subdivision |
Internet |
| -- |
Security. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS |
| General subdivision |
Networking |
| -- |
Security. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
COMPUTERS |
| General subdivision |
Security |
| -- |
General. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| Source of heading or term |
fast |
| 9 (RLIN) |
2191 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computers |
| General subdivision |
Access control |
| Source of heading or term |
fast |
| 9 (RLIN) |
15313 |
| 653 1# - INDEX TERM--UNCONTROLLED |
| Uncontrolled term |
Information security |
| 653 1# - INDEX TERM--UNCONTROLLED |
| Uncontrolled term |
ISC |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
proceedings (reports) |
| Source of term |
aat |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Conference papers and proceedings |
| Source of term |
fast |
| 9 (RLIN) |
6065 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Conference papers and proceedings. |
| Source of term |
lcgft |
| 9 (RLIN) |
6065 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Actes de congrès. |
| Source of term |
rvmgf |
| 9 (RLIN) |
609890 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Zhang, Kan. |
| 9 (RLIN) |
18359 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Zheng, Yuliang, |
| Dates associated with a name |
1962- |
| -- |
https://id.oclc.org/worldcat/entity/E39PCjGWXTXKBb9THw9PRJXXtX |
| 9 (RLIN) |
18360 |
| 710 2# - ADDED ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
LINK (Online service) |
| -- |
https://id.oclc.org/worldcat/entity/E39QH7JmqkRqbCq7YPR7CghJc6 |
| 758 ## - |
| -- |
has work: |
| -- |
Information security (Text) |
| -- |
https://id.oclc.org/worldcat/entity/E39PCFVKd8KpfWRRqfHWgGGXMP |
| -- |
https://id.oclc.org/worldcat/ontology/hasWork |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Print version: |
| Main entry heading |
ISC 2004 (2004 : Palo Alto, Calif.). |
| Title |
Information security. |
| Place, publisher, and date of publication |
Berlin ; New York : Springer, ©2004 |
| International Standard Book Number |
3540232087 |
| Record control number |
(DLC) 2004112165 |
| -- |
(OCoLC)56583356 |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Lecture notes in computer science ; |
| Volume number/sequential designation |
3225. |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="https://link.springer.com/10.1007/b100936">https://link.springer.com/10.1007/b100936</a> |
| 938 ## - |
| -- |
Askews and Holts Library Services |
| -- |
ASKH |
| -- |
AH20751522 |
| 938 ## - |
| -- |
Baker & Taylor |
| -- |
BKTY |
| -- |
84.00 |
| -- |
84.00 |
| -- |
3540232087 |
| -- |
0006112533 |
| -- |
active |
| 938 ## - |
| -- |
ProQuest Ebook Central |
| -- |
EBLB |
| -- |
EBL3087217 |
| 938 ## - |
| -- |
EBSCOhost |
| -- |
EBSC |
| -- |
144509 |
| 938 ## - |
| -- |
YBP Library Services |
| -- |
YANK |
| -- |
2367962 |
| 994 ## - |
| -- |
92 |
| -- |
ATIST |