Applying Security Engineering to Build Security Countermeasures: An Introduction. Kim, T. & yeol Kwon, H. In Dongarra, J. J., Madsen, K., & Wasniewski, J., editors, PARA, volume 3732, of Lecture Notes in Computer Science, pages 957-963, 2004. Springer. Link Paper bibtex @inproceedings{conf/para/KimK04,
added-at = {2017-05-25T00:00:00.000+0200},
author = {Kim, Tai-Hoon and yeol Kwon, Ho},
biburl = {https://www.bibsonomy.org/bibtex/2d63765351a59a9cfe2d63bf508cc8f54/dblp},
booktitle = {PARA},
crossref = {conf/para/2004},
editor = {Dongarra, Jack J. and Madsen, Kaj and Wasniewski, Jerzy},
ee = {https://doi.org/10.1007/11558958_116},
interhash = {fd05d8c02dc9dc273a7e6d0364754bee},
intrahash = {d63765351a59a9cfe2d63bf508cc8f54},
isbn = {3-540-29067-2},
keywords = {dblp},
pages = {957-963},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2017-08-22T11:51:12.000+0200},
title = {Applying Security Engineering to Build Security Countermeasures: An Introduction.},
url = {http://dblp.uni-trier.de/db/conf/para/para2004.html#KimK04},
volume = 3732,
year = 2004
}
Downloads: 0
{"_id":"fXsBmzzmn7hXW53Gr","bibbaseid":"kim-yeolkwon-applyingsecurityengineeringtobuildsecuritycountermeasuresanintroduction-2004","downloads":0,"creationDate":"2018-10-25T08:37:08.870Z","title":"Applying Security Engineering to Build Security Countermeasures: An Introduction.","author_short":["Kim, T.","yeol Kwon, H."],"year":2004,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Hoon kim?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2017-05-25T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Kim"],"firstnames":["Tai-Hoon"],"suffixes":[]},{"propositions":["yeol"],"lastnames":["Kwon"],"firstnames":["Ho"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2d63765351a59a9cfe2d63bf508cc8f54/dblp","booktitle":"PARA","crossref":"conf/para/2004","editor":[{"propositions":[],"lastnames":["Dongarra"],"firstnames":["Jack","J."],"suffixes":[]},{"propositions":[],"lastnames":["Madsen"],"firstnames":["Kaj"],"suffixes":[]},{"propositions":[],"lastnames":["Wasniewski"],"firstnames":["Jerzy"],"suffixes":[]}],"ee":"https://doi.org/10.1007/11558958_116","interhash":"fd05d8c02dc9dc273a7e6d0364754bee","intrahash":"d63765351a59a9cfe2d63bf508cc8f54","isbn":"3-540-29067-2","keywords":"dblp","pages":"957-963","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2017-08-22T11:51:12.000+0200","title":"Applying Security Engineering to Build Security Countermeasures: An Introduction.","url":"http://dblp.uni-trier.de/db/conf/para/para2004.html#KimK04","volume":"3732","year":"2004","bibtex":"@inproceedings{conf/para/KimK04,\n added-at = {2017-05-25T00:00:00.000+0200},\n author = {Kim, Tai-Hoon and yeol Kwon, Ho},\n biburl = {https://www.bibsonomy.org/bibtex/2d63765351a59a9cfe2d63bf508cc8f54/dblp},\n booktitle = {PARA},\n crossref = {conf/para/2004},\n editor = {Dongarra, Jack J. and Madsen, Kaj and Wasniewski, Jerzy},\n ee = {https://doi.org/10.1007/11558958_116},\n interhash = {fd05d8c02dc9dc273a7e6d0364754bee},\n intrahash = {d63765351a59a9cfe2d63bf508cc8f54},\n isbn = {3-540-29067-2},\n keywords = {dblp},\n pages = {957-963},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2017-08-22T11:51:12.000+0200},\n title = {Applying Security Engineering to Build Security Countermeasures: An Introduction.},\n url = {http://dblp.uni-trier.de/db/conf/para/para2004.html#KimK04},\n volume = 3732,\n year = 2004\n}\n\n","author_short":["Kim, T.","yeol Kwon, H."],"editor_short":["Dongarra, J. J.","Madsen, K.","Wasniewski, J."],"key":"conf/para/KimK04","id":"conf/para/KimK04","bibbaseid":"kim-yeolkwon-applyingsecurityengineeringtobuildsecuritycountermeasuresanintroduction-2004","role":"author","urls":{"Link":"https://doi.org/10.1007/11558958_116","Paper":"http://dblp.uni-trier.de/db/conf/para/para2004.html#KimK04"},"keyword":["dblp"],"downloads":0},"search_terms":["applying","security","engineering","build","security","countermeasures","introduction","kim","yeol kwon"],"keywords":["dblp"],"authorIDs":[],"dataSources":["6BJ3auXn3vcLgcJwL"]}