这是indexloc提供的服务,不要输入任何密码

BibTeX record conf/csiirw/Tucker16

download as .bib file

@inproceedings{DBLP:conf/csiirw/Tucker16,
  author       = {Scot Tucker},
  title        = {Trusted Information Exchange Using Trusted Network Processors},
  booktitle    = {Proceedings of the 11th Annual Cyber and Information Security Research
                  Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
  pages        = {3:1--3:8},
  year         = {2016},
  crossref     = {DBLP:conf/csiirw/2016},
  url          = {https://doi.org/10.1145/2897795.2897809},
  doi          = {10.1145/2897795.2897809},
  timestamp    = {Sun, 19 Jan 2025 13:35:05 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Tucker16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2016,
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  John R. Goodall and
                  Robert A. Bridges},
  title        = {Proceedings of the 11th Annual Cyber and Information Security Research
                  Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2897795},
  isbn         = {978-1-4503-3752-6},
  timestamp    = {Sun, 16 Nov 2025 20:19:41 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}