A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 / Ray Snouffer ; Annabelle Lee ; Arch Oldehoeft

Saved in:
Bibliographic Details
Superior document:NIST special publication 800-29 : Computer security
VerfasserIn:
Place / Publishing House:Washington, DC : NIST, 2001
Year of Publication:2001
Language:English
Series:NIST special publication 800-29 : Computer security
Physical Description:I, 27 S.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 990000373790504498
ctrlnum AC03254549
(AT-OBV)AC03254549
(Aleph)003248703ACC01
(DE-599)OBVAC03254549
(EXLNZ-43ACC_NETWORK)990032487030203331
collection bib_alma
institution YWOAW
building MAG2-1
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00860nam#a2200277zcb4500</leader><controlfield tag="001">990000373790504498</controlfield><controlfield tag="005">20230424173105.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">010913|2001####|||###########|||#|#eng#c</controlfield><controlfield tag="009">AC03254549</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(AT-OBV)AC03254549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">AC03254549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Aleph)003248703ACC01</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)OBVAC03254549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLNZ-43ACC_NETWORK)990032487030203331</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OAW</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="c">XD-US</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Snouffer, Ray</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2</subfield><subfield code="c">Ray Snouffer ; Annabelle Lee ; Arch Oldehoeft</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, DC</subfield><subfield code="b">NIST</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">I, 27 S.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NIST special publication</subfield><subfield code="v">800-29 : Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Annabelle</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oldehoeft, Arch</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="w">(AT-OBV)AC00350863</subfield><subfield code="v">800-29</subfield></datafield><datafield tag="970" ind1="1" ind2=" "><subfield code="c">24</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-04-24 17:31:05 Europe/Vienna</subfield><subfield code="d">20</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2018-12-24 09:37:43 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="HOL" ind1="8" ind2=" "><subfield code="b">YWOAW</subfield><subfield code="h"> 100317.29 </subfield><subfield code="c">MAG2-1</subfield><subfield code="8">2218488810004498</subfield></datafield><datafield tag="852" ind1="8" ind2=" "><subfield code="b">YWOAW</subfield><subfield code="c">MAG2-1</subfield><subfield code="h"> 100317.29 </subfield><subfield code="8">2218488810004498</subfield></datafield><datafield tag="ITM" ind1=" " ind2=" "><subfield code="9">2218488810004498</subfield><subfield code="e">1</subfield><subfield code="m">BOOK</subfield><subfield code="b">+YW545302</subfield><subfield code="i">2000:4268</subfield><subfield code="2">MAG2-1</subfield><subfield code="o">2001-09-13 11:45:49</subfield><subfield code="8">2318488800004498</subfield><subfield code="f">02</subfield><subfield code="p">2001-09-13 02:00:00 Europe/Vienna</subfield><subfield code="h">100317.29</subfield><subfield code="1">YWOAW</subfield><subfield code="q">2022-06-20 23:35:05 Europe/Vienna</subfield></datafield></record></collection>
record_format marc
spelling Snouffer, Ray aut
<<A>> comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 Ray Snouffer ; Annabelle Lee ; Arch Oldehoeft
Washington, DC NIST 2001
I, 27 S.
NIST special publication 800-29 : Computer security
Lee, Annabelle aut
Oldehoeft, Arch aut
(AT-OBV)AC00350863 800-29
YWOAW MAG2-1 100317.29 2218488810004498
language English
format Book
author Snouffer, Ray
Lee, Annabelle
Oldehoeft, Arch
spellingShingle Snouffer, Ray
Lee, Annabelle
Oldehoeft, Arch
A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2
NIST special publication
author_facet Snouffer, Ray
Lee, Annabelle
Oldehoeft, Arch
Lee, Annabelle
Oldehoeft, Arch
author_variant r s rs
a l al
a o ao
author_role VerfasserIn
VerfasserIn
VerfasserIn
author2 Lee, Annabelle
Oldehoeft, Arch
author2_role VerfasserIn
VerfasserIn
author_sort Snouffer, Ray
title A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2
title_full A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 Ray Snouffer ; Annabelle Lee ; Arch Oldehoeft
title_fullStr A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 Ray Snouffer ; Annabelle Lee ; Arch Oldehoeft
title_full_unstemmed A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 Ray Snouffer ; Annabelle Lee ; Arch Oldehoeft
title_auth A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2
title_new A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2
title_sort comparison of the security requirements for cryptographic modules in fips 140-1 and fips 140-2
series NIST special publication
series2 NIST special publication
publisher NIST
publishDate 2001
physical I, 27 S.
callnumber-raw 100317.29
callnumber-search 100317.29
illustrated Not Illustrated
work_keys_str_mv AT snoufferray acomparisonofthesecurityrequirementsforcryptographicmodulesinfips1401andfips1402
AT leeannabelle acomparisonofthesecurityrequirementsforcryptographicmodulesinfips1401andfips1402
AT oldehoeftarch acomparisonofthesecurityrequirementsforcryptographicmodulesinfips1401andfips1402
status_str n
ids_txt_mv (AT-OBV)AC03254549
AC03254549
(Aleph)003248703ACC01
(DE-599)OBVAC03254549
(EXLNZ-43ACC_NETWORK)990032487030203331
hol852bOwn_txt_mv YWOAW
hol852hSignatur_txt_mv 100317.29
hol852cSonderstandort_txt_mv MAG2-1
itmData_txt_mv 2001-09-13 02:00:00 Europe/Vienna
barcode_str_mv +YW545302
callnumbers_txt_mv 100317.29
inventoryNumbers_str_mv 2000:4268
materialTypes_str_mv BOOK
permanentLibraries_str_mv YWOAW
permanentLocations_str_mv MAG2-1
inventoryDates_str_mv 2001-09-13 11:45:49
createdDates_str_mv 2001-09-13 02:00:00 Europe/Vienna
holdingIds_str_mv 2218488810004498
hierarchy_parent_id AC00350863
hierarchy_parent_title NIST special publication 800-29 : Computer security
hierarchy_sequence 800-29
is_hierarchy_id AC03254549
is_hierarchy_title <<A>> comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2
container_title NIST special publication 800-29 : Computer security
container_reference AC00350863
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1787548201161588736