Wake up or fall asleep-value implication of trusted computing. Hu, N., Huang, J., Liu, L., Li, Y., & Ma, D. Inf. Technol. Manag., 10(4):177-192, 2009.
Link
Paper bibtex @article{journals/itm/HuHLLM09,
added-at = {2020-05-22T00:00:00.000+0200},
author = {Hu, Nan and Huang, Jianhui and Liu, Ling and Li, Yingjiu and Ma, Dan},
biburl = {https://www.bibsonomy.org/bibtex/28f29459ff65b966f5daf61a0265c3712/dblp},
ee = {https://doi.org/10.1007/s10799-009-0060-7},
interhash = {5ba27ccf8334e684e320fafe78e547bc},
intrahash = {8f29459ff65b966f5daf61a0265c3712},
journal = {Inf. Technol. Manag.},
keywords = {dblp},
number = 4,
pages = {177-192},
timestamp = {2020-05-23T12:36:36.000+0200},
title = {Wake up or fall asleep-value implication of trusted computing.},
url = {http://dblp.uni-trier.de/db/journals/itm/itm10.html#HuHLLM09},
volume = 10,
year = 2009
}
Downloads: 0
{"_id":"3meFHxXg9EMQXepFA","bibbaseid":"hu-huang-liu-li-ma-wakeuporfallasleepvalueimplicationoftrustedcomputing-2009","author_short":["Hu, N.","Huang, J.","Liu, L.","Li, Y.","Ma, D."],"bibdata":{"bibtype":"article","type":"article","added-at":"2020-05-22T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Hu"],"firstnames":["Nan"],"suffixes":[]},{"propositions":[],"lastnames":["Huang"],"firstnames":["Jianhui"],"suffixes":[]},{"propositions":[],"lastnames":["Liu"],"firstnames":["Ling"],"suffixes":[]},{"propositions":[],"lastnames":["Li"],"firstnames":["Yingjiu"],"suffixes":[]},{"propositions":[],"lastnames":["Ma"],"firstnames":["Dan"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/28f29459ff65b966f5daf61a0265c3712/dblp","ee":"https://doi.org/10.1007/s10799-009-0060-7","interhash":"5ba27ccf8334e684e320fafe78e547bc","intrahash":"8f29459ff65b966f5daf61a0265c3712","journal":"Inf. Technol. Manag.","keywords":"dblp","number":"4","pages":"177-192","timestamp":"2020-05-23T12:36:36.000+0200","title":"Wake up or fall asleep-value implication of trusted computing.","url":"http://dblp.uni-trier.de/db/journals/itm/itm10.html#HuHLLM09","volume":"10","year":"2009","bibtex":"@article{journals/itm/HuHLLM09,\n added-at = {2020-05-22T00:00:00.000+0200},\n author = {Hu, Nan and Huang, Jianhui and Liu, Ling and Li, Yingjiu and Ma, Dan},\n biburl = {https://www.bibsonomy.org/bibtex/28f29459ff65b966f5daf61a0265c3712/dblp},\n ee = {https://doi.org/10.1007/s10799-009-0060-7},\n interhash = {5ba27ccf8334e684e320fafe78e547bc},\n intrahash = {8f29459ff65b966f5daf61a0265c3712},\n journal = {Inf. Technol. Manag.},\n keywords = {dblp},\n number = 4,\n pages = {177-192},\n timestamp = {2020-05-23T12:36:36.000+0200},\n title = {Wake up or fall asleep-value implication of trusted computing.},\n url = {http://dblp.uni-trier.de/db/journals/itm/itm10.html#HuHLLM09},\n volume = 10,\n year = 2009\n}\n\n","author_short":["Hu, N.","Huang, J.","Liu, L.","Li, Y.","Ma, D."],"key":"journals/itm/HuHLLM09","id":"journals/itm/HuHLLM09","bibbaseid":"hu-huang-liu-li-ma-wakeuporfallasleepvalueimplicationoftrustedcomputing-2009","role":"author","urls":{"Link":"https://doi.org/10.1007/s10799-009-0060-7","Paper":"http://dblp.uni-trier.de/db/journals/itm/itm10.html#HuHLLM09"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/dan ma ?items=1000","dataSources":["vSwJtFihuqQGBSEPi","xgR4PcNWKd8qxYrvz","SAGQ2TrnqeX3eFmL3"],"keywords":["dblp"],"search_terms":["wake","fall","asleep","value","implication","trusted","computing","hu","huang","liu","li","ma"],"title":"Wake up or fall asleep-value implication of trusted computing.","year":2009}