Improving the ISO/IEC 11770 standard for key management techniques
Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on...
Ausführliche Beschreibung
Autor*in: |
Cremers, Cas [verfasserIn] Horvat, Marko [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: International Journal of Information Security - Springer-Verlag, 2001, 15(2015), 6 vom: 23. Nov., Seite 659-673 |
---|---|
Übergeordnetes Werk: |
volume:15 ; year:2015 ; number:6 ; day:23 ; month:11 ; pages:659-673 |
Links: |
---|
DOI / URN: |
10.1007/s10207-015-0306-9 |
---|
Katalog-ID: |
SPR00913154X |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR00913154X | ||
003 | DE-627 | ||
005 | 20201124063519.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201005s2015 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s10207-015-0306-9 |2 doi | |
035 | |a (DE-627)SPR00913154X | ||
035 | |a (SPR)s10207-015-0306-9-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Cremers, Cas |e verfasserin |4 aut | |
245 | 1 | 0 | |a Improving the ISO/IEC 11770 standard for key management techniques |
264 | 1 | |c 2015 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. | ||
650 | 4 | |a Formal analysis |7 (dpeaa)DE-He213 | |
650 | 4 | |a ISO |7 (dpeaa)DE-He213 | |
650 | 4 | |a Protocol standards |7 (dpeaa)DE-He213 | |
650 | 4 | |a Security protocols |7 (dpeaa)DE-He213 | |
700 | 1 | |a Horvat, Marko |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t International Journal of Information Security |d Springer-Verlag, 2001 |g 15(2015), 6 vom: 23. Nov., Seite 659-673 |w (DE-627)SPR009127291 |7 nnns |
773 | 1 | 8 | |g volume:15 |g year:2015 |g number:6 |g day:23 |g month:11 |g pages:659-673 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s10207-015-0306-9 |z kostenfrei |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
951 | |a AR | ||
952 | |d 15 |j 2015 |e 6 |b 23 |c 11 |h 659-673 |
author_variant |
c c cc m h mh |
---|---|
matchkey_str |
cremerscashorvatmarko:2015----:mrvntesic17sadrfremng |
hierarchy_sort_str |
2015 |
publishDate |
2015 |
allfields |
10.1007/s10207-015-0306-9 doi (DE-627)SPR00913154X (SPR)s10207-015-0306-9-e DE-627 ger DE-627 rakwb eng Cremers, Cas verfasserin aut Improving the ISO/IEC 11770 standard for key management techniques 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. Formal analysis (dpeaa)DE-He213 ISO (dpeaa)DE-He213 Protocol standards (dpeaa)DE-He213 Security protocols (dpeaa)DE-He213 Horvat, Marko verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 15(2015), 6 vom: 23. Nov., Seite 659-673 (DE-627)SPR009127291 nnns volume:15 year:2015 number:6 day:23 month:11 pages:659-673 https://dx.doi.org/10.1007/s10207-015-0306-9 kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 15 2015 6 23 11 659-673 |
spelling |
10.1007/s10207-015-0306-9 doi (DE-627)SPR00913154X (SPR)s10207-015-0306-9-e DE-627 ger DE-627 rakwb eng Cremers, Cas verfasserin aut Improving the ISO/IEC 11770 standard for key management techniques 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. Formal analysis (dpeaa)DE-He213 ISO (dpeaa)DE-He213 Protocol standards (dpeaa)DE-He213 Security protocols (dpeaa)DE-He213 Horvat, Marko verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 15(2015), 6 vom: 23. Nov., Seite 659-673 (DE-627)SPR009127291 nnns volume:15 year:2015 number:6 day:23 month:11 pages:659-673 https://dx.doi.org/10.1007/s10207-015-0306-9 kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 15 2015 6 23 11 659-673 |
allfields_unstemmed |
10.1007/s10207-015-0306-9 doi (DE-627)SPR00913154X (SPR)s10207-015-0306-9-e DE-627 ger DE-627 rakwb eng Cremers, Cas verfasserin aut Improving the ISO/IEC 11770 standard for key management techniques 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. Formal analysis (dpeaa)DE-He213 ISO (dpeaa)DE-He213 Protocol standards (dpeaa)DE-He213 Security protocols (dpeaa)DE-He213 Horvat, Marko verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 15(2015), 6 vom: 23. Nov., Seite 659-673 (DE-627)SPR009127291 nnns volume:15 year:2015 number:6 day:23 month:11 pages:659-673 https://dx.doi.org/10.1007/s10207-015-0306-9 kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 15 2015 6 23 11 659-673 |
allfieldsGer |
10.1007/s10207-015-0306-9 doi (DE-627)SPR00913154X (SPR)s10207-015-0306-9-e DE-627 ger DE-627 rakwb eng Cremers, Cas verfasserin aut Improving the ISO/IEC 11770 standard for key management techniques 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. Formal analysis (dpeaa)DE-He213 ISO (dpeaa)DE-He213 Protocol standards (dpeaa)DE-He213 Security protocols (dpeaa)DE-He213 Horvat, Marko verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 15(2015), 6 vom: 23. Nov., Seite 659-673 (DE-627)SPR009127291 nnns volume:15 year:2015 number:6 day:23 month:11 pages:659-673 https://dx.doi.org/10.1007/s10207-015-0306-9 kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 15 2015 6 23 11 659-673 |
allfieldsSound |
10.1007/s10207-015-0306-9 doi (DE-627)SPR00913154X (SPR)s10207-015-0306-9-e DE-627 ger DE-627 rakwb eng Cremers, Cas verfasserin aut Improving the ISO/IEC 11770 standard for key management techniques 2015 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. Formal analysis (dpeaa)DE-He213 ISO (dpeaa)DE-He213 Protocol standards (dpeaa)DE-He213 Security protocols (dpeaa)DE-He213 Horvat, Marko verfasserin aut Enthalten in International Journal of Information Security Springer-Verlag, 2001 15(2015), 6 vom: 23. Nov., Seite 659-673 (DE-627)SPR009127291 nnns volume:15 year:2015 number:6 day:23 month:11 pages:659-673 https://dx.doi.org/10.1007/s10207-015-0306-9 kostenfrei Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER AR 15 2015 6 23 11 659-673 |
language |
English |
source |
Enthalten in International Journal of Information Security 15(2015), 6 vom: 23. Nov., Seite 659-673 volume:15 year:2015 number:6 day:23 month:11 pages:659-673 |
sourceStr |
Enthalten in International Journal of Information Security 15(2015), 6 vom: 23. Nov., Seite 659-673 volume:15 year:2015 number:6 day:23 month:11 pages:659-673 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Formal analysis ISO Protocol standards Security protocols |
isfreeaccess_bool |
true |
container_title |
International Journal of Information Security |
authorswithroles_txt_mv |
Cremers, Cas @@aut@@ Horvat, Marko @@aut@@ |
publishDateDaySort_date |
2015-11-23T00:00:00Z |
hierarchy_top_id |
SPR009127291 |
id |
SPR00913154X |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR00913154X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20201124063519.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201005s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10207-015-0306-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR00913154X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s10207-015-0306-9-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cremers, Cas</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Improving the ISO/IEC 11770 standard for key management techniques</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Formal analysis</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">ISO</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protocol standards</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security protocols</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Horvat, Marko</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International Journal of Information Security</subfield><subfield code="d">Springer-Verlag, 2001</subfield><subfield code="g">15(2015), 6 vom: 23. Nov., Seite 659-673</subfield><subfield code="w">(DE-627)SPR009127291</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:15</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:6</subfield><subfield code="g">day:23</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:659-673</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s10207-015-0306-9</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">15</subfield><subfield code="j">2015</subfield><subfield code="e">6</subfield><subfield code="b">23</subfield><subfield code="c">11</subfield><subfield code="h">659-673</subfield></datafield></record></collection>
|
author |
Cremers, Cas |
spellingShingle |
Cremers, Cas misc Formal analysis misc ISO misc Protocol standards misc Security protocols Improving the ISO/IEC 11770 standard for key management techniques |
authorStr |
Cremers, Cas |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)SPR009127291 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
Improving the ISO/IEC 11770 standard for key management techniques Formal analysis (dpeaa)DE-He213 ISO (dpeaa)DE-He213 Protocol standards (dpeaa)DE-He213 Security protocols (dpeaa)DE-He213 |
topic |
misc Formal analysis misc ISO misc Protocol standards misc Security protocols |
topic_unstemmed |
misc Formal analysis misc ISO misc Protocol standards misc Security protocols |
topic_browse |
misc Formal analysis misc ISO misc Protocol standards misc Security protocols |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
International Journal of Information Security |
hierarchy_parent_id |
SPR009127291 |
hierarchy_top_title |
International Journal of Information Security |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)SPR009127291 |
title |
Improving the ISO/IEC 11770 standard for key management techniques |
ctrlnum |
(DE-627)SPR00913154X (SPR)s10207-015-0306-9-e |
title_full |
Improving the ISO/IEC 11770 standard for key management techniques |
author_sort |
Cremers, Cas |
journal |
International Journal of Information Security |
journalStr |
International Journal of Information Security |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
txt |
container_start_page |
659 |
author_browse |
Cremers, Cas Horvat, Marko |
container_volume |
15 |
format_se |
Elektronische Aufsätze |
author-letter |
Cremers, Cas |
doi_str_mv |
10.1007/s10207-015-0306-9 |
author2-role |
verfasserin |
title_sort |
improving the iso/iec 11770 standard for key management techniques |
title_auth |
Improving the ISO/IEC 11770 standard for key management techniques |
abstract |
Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. |
abstractGer |
Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. |
abstract_unstemmed |
Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER |
container_issue |
6 |
title_short |
Improving the ISO/IEC 11770 standard for key management techniques |
url |
https://dx.doi.org/10.1007/s10207-015-0306-9 |
remote_bool |
true |
author2 |
Horvat, Marko |
author2Str |
Horvat, Marko |
ppnlink |
SPR009127291 |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.1007/s10207-015-0306-9 |
up_date |
2024-07-04T00:47:40.800Z |
_version_ |
1803607406860566529 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR00913154X</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20201124063519.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201005s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s10207-015-0306-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR00913154X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s10207-015-0306-9-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cremers, Cas</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Improving the ISO/IEC 11770 standard for key management techniques</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract We provide the first systematic analysis of the ISO/IEC 11770 standard for key management techniques (2009, 2009), which describes a set of key establishment, key agreement, and key transport protocols. We analyse the claimed security properties, as well as additional modern requirements on key management protocols, for over 30 protocols and their variants. Our formal, tool-supported analysis of the protocols uncovers several incorrect claims in the standard. We provide concrete suggestions for improving the standard.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Formal analysis</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">ISO</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protocol standards</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security protocols</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Horvat, Marko</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">International Journal of Information Security</subfield><subfield code="d">Springer-Verlag, 2001</subfield><subfield code="g">15(2015), 6 vom: 23. Nov., Seite 659-673</subfield><subfield code="w">(DE-627)SPR009127291</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:15</subfield><subfield code="g">year:2015</subfield><subfield code="g">number:6</subfield><subfield code="g">day:23</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:659-673</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s10207-015-0306-9</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">15</subfield><subfield code="j">2015</subfield><subfield code="e">6</subfield><subfield code="b">23</subfield><subfield code="c">11</subfield><subfield code="h">659-673</subfield></datafield></record></collection>
|
score |
7.400923 |