Hacking Hardware Security Modules - Schneier on Security. Blog, S.
Paper bibtex @misc{schneier_blog_hacking_nodate,
title = {Hacking {Hardware} {Security} {Modules} - {Schneier} on {Security}},
url = {https://www.schneier.com/blog/archives/2019/06/hacking_hardwar.html},
urldate = {2019-06-29},
author = {Schneier Blog},
keywords = {\#broken},
}
Downloads: 0
{"_id":"BkSfbHBwMYdJtWhrB","bibbaseid":"blog-hackinghardwaresecuritymodulesschneieronsecurity","author_short":["Blog, S."],"bibdata":{"bibtype":"misc","type":"misc","title":"Hacking Hardware Security Modules - Schneier on Security","url":"https://www.schneier.com/blog/archives/2019/06/hacking_hardwar.html","urldate":"2019-06-29","author":[{"firstnames":["Schneier"],"propositions":[],"lastnames":["Blog"],"suffixes":[]}],"keywords":"#broken","bibtex":"@misc{schneier_blog_hacking_nodate,\n\ttitle = {Hacking {Hardware} {Security} {Modules} - {Schneier} on {Security}},\n\turl = {https://www.schneier.com/blog/archives/2019/06/hacking_hardwar.html},\n\turldate = {2019-06-29},\n\tauthor = {Schneier Blog},\n\tkeywords = {\\#broken},\n}\n\n\n\n","author_short":["Blog, S."],"key":"schneier_blog_hacking_nodate","id":"schneier_blog_hacking_nodate","bibbaseid":"blog-hackinghardwaresecuritymodulesschneieronsecurity","role":"author","urls":{"Paper":"https://www.schneier.com/blog/archives/2019/06/hacking_hardwar.html"},"keyword":["#broken"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"misc","biburl":"https://bibbase.org/zotero/bxt101","dataSources":["Wsv2bQ4jPuc7qme8R"],"keywords":["#broken"],"search_terms":["hacking","hardware","security","modules","schneier","security","blog"],"title":"Hacking Hardware Security Modules - Schneier on Security","year":null}