default search action
BibTeX record conf/csiirw/Tucker16
@inproceedings{DBLP:conf/csiirw/Tucker16,
author = {Scot Tucker},
title = {Trusted Information Exchange Using Trusted Network Processors},
booktitle = {Proceedings of the 11th Annual Cyber and Information Security Research
Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
pages = {3:1--3:8},
year = {2016},
crossref = {DBLP:conf/csiirw/2016},
url = {https://doi.org/10.1145/2897795.2897809},
doi = {10.1145/2897795.2897809},
timestamp = {Sun, 19 Jan 2025 13:35:05 +0100},
biburl = {https://dblp.org/rec/conf/csiirw/Tucker16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2016,
editor = {Joseph P. Trien and
Stacy J. Prowell and
John R. Goodall and
Robert A. Bridges},
title = {Proceedings of the 11th Annual Cyber and Information Security Research
Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
publisher = {{ACM}},
year = {2016},
url = {http://dl.acm.org/citation.cfm?id=2897795},
isbn = {978-1-4503-3752-6},
timestamp = {Sun, 16 Nov 2025 20:19:41 +0100},
biburl = {https://dblp.org/rec/conf/csiirw/2016.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.