Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/spw/Wheeler01a
%A Wheeler, David
%B Security Protocols Workshop
%D 2001
%E Christianson, Bruce
%E Crispo, Bruno
%E Malcolm, James A.
%E Roe, Michael
%I Springer
%K dblp
%P 180-187
%T Protocols Using Keys from Faulty Data (Transcript of Discussion).
%U http://dblp.uni-trier.de/db/conf/spw/spw2001.html#Wheeler01a
%V 2467
%@ 3-540-44263-4
@inproceedings{conf/spw/Wheeler01a,
added-at = {2017-05-25T00:00:00.000+0200},
author = {Wheeler, David},
biburl = {https://www.bibsonomy.org/bibtex/286c816212a7e599fd9b35843b223014d/dblp},
booktitle = {Security Protocols Workshop},
crossref = {conf/spw/2001},
editor = {Christianson, Bruce and Crispo, Bruno and Malcolm, James A. and Roe, Michael},
ee = {https://doi.org/10.1007/3-540-45807-7_27},
interhash = {c00e07158e653e11190471d11098b510},
intrahash = {86c816212a7e599fd9b35843b223014d},
isbn = {3-540-44263-4},
keywords = {dblp},
pages = {180-187},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T13:45:40.000+0200},
title = {Protocols Using Keys from Faulty Data (Transcript of Discussion).},
url = {http://dblp.uni-trier.de/db/conf/spw/spw2001.html#Wheeler01a},
volume = 2467,
year = 2001
}