Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/atc/KimKRJ07
%A Kim, Mooseop
%A Kim, Youngse
%A Ryou, Jaecheol
%A Jun, Sungik
%B ATC
%D 2007
%E Xiao, Bin
%E Yang, Laurence Tianruo
%E Ma, Jianhua
%E Müller-Schloer, Christian
%E Hua, Yu
%I Springer
%K dblp
%P 410-419
%T Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.
%U http://dblp.uni-trier.de/db/conf/atc/atc2007.html#KimKRJ07
%V 4610
%@ 978-3-540-73546-5
@inproceedings{conf/atc/KimKRJ07,
added-at = {2020-04-17T00:00:00.000+0200},
author = {Kim, Mooseop and Kim, Youngse and Ryou, Jaecheol and Jun, Sungik},
biburl = {https://www.bibsonomy.org/bibtex/2f6c734eb1f416e3367777250c4ea0a0f/dblp},
booktitle = {ATC},
crossref = {conf/atc/2007},
editor = {Xiao, Bin and Yang, Laurence Tianruo and Ma, Jianhua and Müller-Schloer, Christian and Hua, Yu},
ee = {https://doi.org/10.1007/978-3-540-73547-2_42},
interhash = {224a5cdfded938032849ccfd092a2096},
intrahash = {f6c734eb1f416e3367777250c4ea0a0f},
isbn = {978-3-540-73546-5},
keywords = {dblp},
pages = {410-419},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2024-04-09T19:45:42.000+0200},
title = {Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing.},
url = {http://dblp.uni-trier.de/db/conf/atc/atc2007.html#KimKRJ07},
volume = 4610,
year = 2007
}