Wiretap-channels under constrained active and passive attacks. Janda, C. R., Wiese, M., Nötzel, J., Boche, H., & Jorswieck, E. A. In 2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, September 28-30, 2015, pages 16--21, 2015.
Paper doi bibtex @inproceedings{DBLP:conf/cns/JandaWNBJ15,
author = {Carsten Rudolf Janda and
Moritz Wiese and
Janis N{\"{o}}tzel and
Holger Boche and
Eduard A. Jorswieck},
title = {Wiretap-channels under constrained active and passive attacks},
booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
2015, Florence, Italy, September 28-30, 2015},
pages = {16--21},
year = {2015},
crossref = {DBLP:conf/cns/2015},
url = {https://doi.org/10.1109/CNS.2015.7346805},
doi = {10.1109/CNS.2015.7346805},
timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
biburl = {http://dblp.org/rec/bib/conf/cns/JandaWNBJ15},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"bYy4Xrp4eXWp4BaTT","bibbaseid":"janda-wiese-ntzel-boche-jorswieck-wiretapchannelsunderconstrainedactiveandpassiveattacks-2015","downloads":0,"creationDate":"2017-10-29T17:11:36.463Z","title":"Wiretap-channels under constrained active and passive attacks","author_short":["Janda, C. R.","Wiese, M.","Nötzel, J.","Boche, H.","Jorswieck, E. A."],"year":2015,"bibtype":"inproceedings","biburl":"http://dblp.org/pers/tb2/b/Boche:Holger","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Carsten","Rudolf"],"propositions":[],"lastnames":["Janda"],"suffixes":[]},{"firstnames":["Moritz"],"propositions":[],"lastnames":["Wiese"],"suffixes":[]},{"firstnames":["Janis"],"propositions":[],"lastnames":["Nötzel"],"suffixes":[]},{"firstnames":["Holger"],"propositions":[],"lastnames":["Boche"],"suffixes":[]},{"firstnames":["Eduard","A."],"propositions":[],"lastnames":["Jorswieck"],"suffixes":[]}],"title":"Wiretap-channels under constrained active and passive attacks","booktitle":"2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, September 28-30, 2015","pages":"16--21","year":"2015","crossref":"DBLP:conf/cns/2015","url":"https://doi.org/10.1109/CNS.2015.7346805","doi":"10.1109/CNS.2015.7346805","timestamp":"Thu, 15 Jun 2017 01:00:00 +0200","biburl":"http://dblp.org/rec/bib/conf/cns/JandaWNBJ15","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@inproceedings{DBLP:conf/cns/JandaWNBJ15,\n author = {Carsten Rudolf Janda and\n Moritz Wiese and\n Janis N{\\\"{o}}tzel and\n Holger Boche and\n Eduard A. Jorswieck},\n title = {Wiretap-channels under constrained active and passive attacks},\n booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS}\n 2015, Florence, Italy, September 28-30, 2015},\n pages = {16--21},\n year = {2015},\n crossref = {DBLP:conf/cns/2015},\n url = {https://doi.org/10.1109/CNS.2015.7346805},\n doi = {10.1109/CNS.2015.7346805},\n timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},\n biburl = {http://dblp.org/rec/bib/conf/cns/JandaWNBJ15},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Janda, C. R.","Wiese, M.","Nötzel, J.","Boche, H.","Jorswieck, E. A."],"key":"DBLP:conf/cns/JandaWNBJ15","id":"DBLP:conf/cns/JandaWNBJ15","bibbaseid":"janda-wiese-ntzel-boche-jorswieck-wiretapchannelsunderconstrainedactiveandpassiveattacks-2015","role":"author","urls":{"Paper":"https://doi.org/10.1109/CNS.2015.7346805"},"downloads":0},"search_terms":["wiretap","channels","under","constrained","active","passive","attacks","janda","wiese","nötzel","boche","jorswieck"],"keywords":[],"authorIDs":[],"dataSources":["xTHu6bEW8Wt8exXbM"]}