Staff View for: Applied public key infrastructure : 4th

 Staff view

You must be logged in to Tag Records

Applied public key infrastructure : 4th International Workshop : IWAP 2005 /

edited by Jianying Zhou [and others].

Book Cover
Names: Zhou, Jianying.
Published: Amsterdam ; IOS Press, ©2005.
Series: Frontiers in artificial intelligence and applications ; v. 128.
Topics: Public key infrastructure (Computer security) - Congresses. | Public key cryptography - Congresses. | Public key infrastructure (Computer security) | Public key cryptography. | COMPUTERS - Security - Cryptography.
Genres: Electronic books. | Conference papers and proceedings.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 03922cam a2200721La 4500
001 13095253
005 20190725213700.0
006 m o d
007 cr cn|||||||||
008 050722s2005 ne a ob 101 0 eng d
019 |a71550831|a148603139|a228144575|a474161474|a488325084|a491259298|a560230706|a607774945|a647517823|a657537613|a722472958|a728019579
020 |a1423799690|q(electronic bk.)
020 |a9781423799696|q(electronic bk.)
020 |a9781607501367
020 |a1607501368
020 |z1586035509
020 |z9781586035501
035 |a(OCoLC)ocn228144574
035 |a(GRNdb)194806
037 |a978-1-58603-550-1|bIOS Press|nhttp://www.iospress.nl
040 |aNz|beng|epn|cUV0|dOCLCQ|dN$T|dYDXCP|dIOSPR|dOCLCE|dIDEBK|dOCLCQ|dDKDLA|dMERUC|dCCO|dE7B|dMHW|dOCLCQ|dOCLCO|dOCLCF|dOCL|dOCLCQ|dEBLCP|dOCLCQ|dGRNdb
042 |adlr
049 |aIAGM
050 4|aQA76.9.A25|bI558 2005eb
072 7|aCOM|xCOM004000|2bisacsh
082 04|a005.8/2|222
111 2 |aInternational Workshop for Applied PKI|n(4th :|d2005 :|cSingapore)
245 10|aApplied public key infrastructure :|b4th International Workshop : IWAP 2005 /|cedited by Jianying Zhou [and others].
246 30|aIWAP 2005
260 |aAmsterdam ;|aWashington, DC :|bIOS Press,|c©2005.
300 |a1 online resource (x, 265 pages) :|billustrations.
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
490 1 |aFrontiers in artificial intelligence and applications ;|vv. 128
504 |aIncludes bibliographical references and author index.
505 0 |aTitle page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index.
506 |3Use copy|fRestrictions unspecified|2star|5MiAaHDL
533 |aElectronic reproduction.|b[S.l.] :|cHathiTrust Digital Library,|d2010.|5MiAaHDL
538 |aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.|uhttp://purl.oclc.org/DLF/benchrepro0212|5MiAaHDL
583 1 |adigitized|c2010|hHathiTrust Digital Library|lcommitted to preserve|2pda|5MiAaHDL
588 0 |aPrint version record.
650 0|aPublic key infrastructure (Computer security)|vCongresses.
650 0|aPublic key cryptography|vCongresses.
650 4|aPublic key infrastructure (Computer security)
650 4|aPublic key cryptography.
650 7|aCOMPUTERS|xSecurity|xCryptography.|2bisacsh
650 7|aPublic key cryptography.|2fast|0(OCoLC)fst01082562
650 7|aPublic key infrastructure (Computer security)|2fast|0(OCoLC)fst01082563
655 4|aElectronic books.
655 7|aConference papers and proceedings.|2fast|0(OCoLC)fst01423772
700 1 |aZhou, Jianying.
776 08|iPrint version:|aInternational Workshop for Applied PKI (4th : 2005 : Singapore).|tApplied public key infrastructure.|dAmsterdam ; Washington, DC : IOS Press, ©2005|w(DLC) 2005931171
830 0|aFrontiers in artificial intelligence and applications ;|vv. 128.
852 |bOnline Bk3|t1
856 40|3EBSCO eBook Subscription Academic Collection.|uhttps://greenville.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=163999|zAccess for Greenville College users.
938 |aEBL - Ebook Library|bEBLB|nEBL265956
938 |aebrary|bEBRY|nebr10130681
938 |aEBSCOhost|bEBSC|n163999
938 |aYBP Library Services|bYANK|n3207153
938 |aYBP Library Services|bYANK|n2470902
945 |aeBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America
994 |a92|bIAG

Staff View for: Applied public key infrastructure : 4th